Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: libclxclient

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
created 5 hours ago Activity log
  • Created suggestion
lxc lxc-user-nic insufficient ownership validation allows cross-tenant OVS port deletion

lxc is a Linux container runtime. In the setuid helper lxc-user-nic, the delete path contains a logic flaw in the find_line() function that allows an unprivileged user to delete OVS-attached network interfaces belonging to other users. When lxc-user-nic delete scans its NIC database to authorize a deletion request, the interface name comparison can set the authorization flag based on a name match alone, even when the ownership, type, and link fields in that database entry belong to a different user. The vulnerable check sits after the goto next label handling, meaning it is reachable on lines where earlier ownership checks failed or were skipped. Because nothing downstream of this authorization signal re-verifies that the matched database line actually belongs to the caller, an unprivileged attacker with a valid lxc-usernet policy entry can trigger deletion of another user's OVS port on the same bridge. This is limited to multi-tenant environments using lxc-user-nic with OpenVSwitch bridges. The impact is denial of service - one tenant can repeatedly disconnect networking from containers run by another tenant on shared infrastructure. This is patched in version 7.0.0.

Affected products

lxc
  • ==< 7.0.0

Matching in nixpkgs

pkgs.lxc

Userspace tools for Linux Containers, a lightweight virtualization system

pkgs.lxcfs

FUSE filesystem for LXC

Package maintainers