Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.856644
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for lxc (openSUSE-SU-2024:0342-1)
Summary:The remote host is missing an update for the 'lxc'; package(s) announced via the openSUSE-SU-2024:0342-1 advisory.
Description:Summary:
The remote host is missing an update for the 'lxc'
package(s) announced via the openSUSE-SU-2024:0342-1 advisory.

Vulnerability Insight:
This update for lxc fixes the following issues:

lxc was updated to 6.0.2:

The LXC team is pleased to announce the release of LXC 6.0.2! This is
the second bugfix release for LXC 6.0 which is supported until June 2029.

As usual this bugfix releases focus on stability and hardening.

* Some of the highlights for this release are:

- Reduced log level on some common messages

- Fix compilation error on aarch64

* Detailed changelog

- Remove unused function

- idmap: Lower logging level of newXidmap tools to INFO

- Exit 0 when there's no error

- doc: Fix definitions of get_config_path and set_config_path

- README: Update security contact

- fix possible clang compile error in AARCH

Update to 6.0.1:

The LXC team is pleased to announce the release of LXC 6.0.1! This is
the first bugfix release for LXC 6.0 which is supported until June 2029.

As usual this bugfix releases focus on stability and hardening.

* Highlights

- Fixed some build tooling issues

- Fixed startup failures on system without IPv6 support

- Updated AppArmor rules to avoid potential warnings

Update to 6.0.0:

The LXC team is pleased to announce the release of LXC 6.0 LTS! This is
the result of two years of work since the LXC 5.0 release and is the sixth
LTS release for the LXC project. This release will be supported until June
2029.

* New multi-call binary¶

A new tools-multicall=true configuration option can be used to produce
a single lxc binary which can then have all other lxc-XYZ commands be
symlinked to. This allows for a massive disk space reduction, particularly
useful for embedded platforms.

* Add a set_timeout function to the library

A new set_timeout function is available on the main lxc_container
struct and allow for setting a global timeout for interactions with the
LXC monitor. Prior to this, there was no timeout, leading to potential
deadlocks as there's also no way to cancel an monitor request. As a result
of adding this new symbol to the library, we have bumped the liblxc symbol
version to 1.8.0.

* LXC bridge now has IPV6 enabled

The default lxcbr0 bridge now comes with IPv6 enabled by default,
using an IPv6 ULA subnet. Support for uid/gid selection in lxc-usernsexec
The lxc-usernsexec tool now has both -u and -g options to control what
resulting UID and GID (respectively) the user wishes to use ...

Description truncated. Please see the references for more information.

Affected Software/OS:
'lxc' package(s) on openSUSE Backports SLE-15-SP5.

Solution:
Please install the updated package(s).

CVSS Score:
1.7

CVSS Vector:
AV:L/AC:L/Au:S/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-47952
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45
https://github.com/MaherAzzouzi/CVE-2022-47952
https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274
https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104
https://lists.debian.org/debian-lts-announce/2023/08/msg00025.html
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.