3.3

CVE-2018-6556

lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.

Data is provided by the National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version18.04 SwEditionlts
LinuxcontainersLxc Version >= 2.0.0 <= 2.0.9
LinuxcontainersLxc Version >= 3.0.0 < 3.0.2
SuseCaas Platform Version1.0
SuseCaas Platform Version2.0
SuseOpenstack Cloud Version6
SuseSuse Linux Enterprise Server Version11 Updatesp3 SwEditionltss
SuseSuse Linux Enterprise Server Version11 Updatesp4
OpensuseLeap Version15.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.124
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.3 1.8 1.4
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N