Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.18.1.2024.0342.1
Kategorie:openSUSE Local Security Checks
Titel:openSUSE Security Advisory (openSUSE-SU-2024:0342-1)
Zusammenfassung:The remote host is missing an update for the 'lxc' package(s) announced via the openSUSE-SU-2024:0342-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'lxc' package(s) announced via the openSUSE-SU-2024:0342-1 advisory.

Vulnerability Insight:
This update for lxc fixes the following issues:

lxc was updated to 6.0.2:

The LXC team is pleased to announce the release of LXC 6.0.2!
This is the second bugfix release for LXC 6.0 which is supported
until June 2029.

As usual this bugfix releases focus on stability and hardening.

* Some of the highlights for this release are:

- Reduced log level on some common messages
- Fix compilation error on aarch64

* Detailed changelog

- Remove unused function
- idmap: Lower logging level of newXidmap tools to INFO
- Exit 0 when there's no error
- doc: Fix definitions of get_config_path and set_config_path
- README: Update security contact
- fix possible clang compile error in AARCH

Update to 6.0.1:

The LXC team is pleased to announce the release of LXC 6.0.1!
This is the first bugfix release for LXC 6.0 which is supported
until June 2029.

As usual this bugfix releases focus on stability and hardening.

* Highlights

- Fixed some build tooling issues
- Fixed startup failures on system without IPv6 support
- Updated AppArmor rules to avoid potential warnings

Update to 6.0.0:

The LXC team is pleased to announce the release of LXC 6.0 LTS!
This is the result of two years of work since the LXC 5.0 release
and is the sixth LTS release for the LXC project. This release
will be supported until June 2029.

* New multi-call binaryP

A new tools-multicall=true configuration option can be used to
produce a single lxc binary which can then have all other
lxc-XYZ commands be symlinked to.
This allows for a massive disk space reduction, particularly
useful for embedded platforms.

* Add a set_timeout function to the library

A new set_timeout function is available on the main
lxc_container struct and allow for setting a global timeout for
interactions with the LXC monitor.
Prior to this, there was no timeout, leading to potential
deadlocks as there's also no way to cancel an monitor request.
As a result of adding this new symbol to the library, we have
bumped the liblxc symbol version to 1.8.0.

* LXC bridge now has IPV6 enabled

The default lxcbr0 bridge now comes with IPv6 enabled by
default, using an IPv6 ULA subnet.
Support for uid/gid selection in lxc-usernsexec
The lxc-usernsexec tool now has both -u and -g options to
control what resulting UID and GID (respectively) the user
wishes to use (defaulting to 0/0).

* Improvements to lxc-checkconfig

lxc-checkconfig now only shows the version if lxc-start is
present (rather than failing).
Additionally, it's seen a number of other cosmetic improvements
as well as now listing the maximum number of allowed namespaces
for every namespace type.

* Support for squashfs OCI images

The built-in oci container template can now handle squashfs
compressed OCI images through the use of atomfs.

* Switched from systemd's dbus to dbus-1

LXC now uses libdbus-1 for DBus interactions with ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'lxc' package(s) on openSUSE Leap 15.5, openSUSE Leap 15.6.

Solution:
Please install the updated package(s).

CVSS Score:
1.7

CVSS Vector:
AV:L/AC:L/Au:S/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-47952
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45
https://github.com/MaherAzzouzi/CVE-2022-47952
https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274
https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104
https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html
CopyrightCopyright (C) 2025 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.