Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2018-6556: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2018-6556: SUSE Linux Security Advisory

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
08/10/2018
Created
03/19/2019
Added
08/15/2018
Modified
10/22/2021

Description

lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.

Solution(s)

  • suse-upgrade-liblxc-devel
  • suse-upgrade-liblxc1
  • suse-upgrade-lxc
  • suse-upgrade-lxc-bash-completion
  • suse-upgrade-lxcfs
  • suse-upgrade-lxcfs-hooks-lxc
  • suse-upgrade-pam_cgfs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;