<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="201808-02"> <title>LinuX Containers user space utilities: Arbitrary file read</title> <synopsis>A vulnerability has been found in LXC which may allow for arbitrary file access (read-only). </synopsis> <product type="ebuild">lxc</product> <announced>2018-08-22</announced> <revised count="3">2018-10-17</revised> <bug>662780</bug> <access>local</access> <affected> <package name="app-emulation/lxc" auto="yes" arch="*"> <unaffected range="ge">2.1.1-r1</unaffected> <vulnerable range="lt">2.1.1-r1</vulnerable> </package> </affected> <background> <p>LinuX Containers user space utilities.</p> </background> <description> <p>lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn’t otherwise be able to reach. </p> </description> <impact type="low"> <p>A local unprivileged user could use this flaw to access arbitrary files, including special device files. </p> </impact> <workaround> <p>There is no known workaround at this time.</p> </workaround> <resolution> <p>All LXC users should upgrade to the latest version:</p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/lxc-2.1.1-r1" </code> </resolution> <references> <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-6556">CVE-2018-6556</uri> </references> <metadata tag="requester" timestamp="2018-08-13T17:16:02Z">irishluck83</metadata> <metadata tag="submitter" timestamp="2018-10-17T23:09:04Z">Zlogene</metadata> </glsa>