Arch Linux Security Advisory ASA-201705-17
=========================================
Severity: Low
Date    : 2017-05-13
CVE-ID  : CVE-2017-5985
Package : lxc
Type    : insufficient validation
Remote  : No
Link    : https://security.archlinux.org/AVG-204

Summary
======
The package lxc before version 1:2.0.8-1 is vulnerable to insufficient
validation.

Resolution
=========
Upgrade to 1:2.0.8-1.

# pacman -Syu "lxc>=1:2.0.8-1"

The problem has been fixed upstream in version 2.0.8.

Workaround
=========
None.

Description
==========
This security issue was reported by Jann Horn and has to do with a lack
of netns ownership check in lxc-user-nic, which would allow any user
with a lxc-usernet allocation to create network interfaces on the host
including choosing the name of that network interface. The created
interface wouldn't be UP so is unlikely to be automatically brought up
or get an address, but this issue could be used to squat the name of a
real system network interface before it appears.

Impact
=====
A local attacker is able to spoof a new network interface.

References
=========
https://lists.linuxcontainers.org/pipermail/lxc-users/2017-March/012925.html
https://security.archlinux.org/CVE-2017-5985

ArchLinux: 201705-17: lxc: insufficient validation

May 13, 2017

Summary

This security issue was reported by Jann Horn and has to do with a lack of netns ownership check in lxc-user-nic, which would allow any user with a lxc-usernet allocation to create network interfaces on the host including choosing the name of that network interface. The created interface wouldn't be UP so is unlikely to be automatically brought up or get an address, but this issue could be used to squat the name of a real system network interface before it appears.

Resolution

Upgrade to 1:2.0.8-1. # pacman -Syu "lxc>=1:2.0.8-1"
The problem has been fixed upstream in version 2.0.8.

References

https://lists.linuxcontainers.org/pipermail/lxc-users/2017-March/012925.html https://security.archlinux.org/CVE-2017-5985

Severity
Package : lxc
Type : insufficient validation
Remote : No
Link : https://security.archlinux.org/AVG-204

Workaround

None.

Related News