{"id":"UBUNTU-CVE-2022-47952","details":"lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because \"Failed to open\" often indicates that a file does not exist, whereas \"does not refer to a network namespace path\" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that \"we will report back to the user that the open() failed but the user has no way of knowing why it failed\"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.","modified":"2025-10-24T04:54:04Z","published":"2023-01-01T06:15:00Z","upstream":["CVE-2022-47952"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47952"},{"type":"REPORT","url":"https://github.com/MaherAzzouzi/CVE-2022-47952"},{"type":"REPORT","url":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/lxc.spec.in#L274"},{"type":"REPORT","url":"https://github.com/lxc/lxc/blob/0b83d71c2c8f3bac9503f894cd84584f79258bb3/src/lxc/cmd/lxc_user_nic.c#L1085-L1104"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-47952"}],"affected":[{"package":{"name":"lxc","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/lxc@1.0.10-0ubuntu1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.0~alpha1-0ubuntu11","1.0.0~alpha2-0ubuntu1","1.0.0~alpha2-0ubuntu3","1.0.0~alpha2-0ubuntu4","1.0.0~alpha2-0ubuntu5","1.0.0~alpha2-0ubuntu6","1.0.0~alpha3-0ubuntu1","1.0.0~alpha3-0ubuntu2","1.0.0~alpha3-0ubuntu3","1.0.0~alpha3-0ubuntu4","1.0.0~alpha3-0ubuntu5","1.0.0~alpha3-0ubuntu6","1.0.0~alpha3-0ubuntu7","1.0.0~alpha3-0ubuntu8","1.0.0~beta1-0ubuntu1","1.0.0~beta1-0ubuntu2","1.0.0~beta1-0ubuntu3","1.0.0~beta2-0ubuntu1","1.0.0~beta2-0ubuntu2","1.0.0~beta3-0ubuntu1","1.0.0~beta4-0ubuntu1","1.0.0~beta4-0ubuntu2","1.0.0~rc1-0ubuntu2","1.0.0~rc3-0ubuntu1","1.0.0~rc4-0ubuntu1","1.0.0-0ubuntu1","1.0.0-0ubuntu2","1.0.0-0ubuntu3","1.0.0-0ubuntu4","1.0.1-0ubuntu1","1.0.2-0ubuntu1","1.0.2-0ubuntu2","1.0.3-0ubuntu1","1.0.3-0ubuntu2","1.0.3-0ubuntu3","1.0.4-0ubuntu0.1","1.0.5-0ubuntu0.1","1.0.6-0ubuntu0.1","1.0.7-0ubuntu0.1","1.0.7-0ubuntu0.2","1.0.7-0ubuntu0.5","1.0.7-0ubuntu0.6","1.0.7-0ubuntu0.7","1.0.7-0ubuntu0.9","1.0.7-0ubuntu0.10","1.0.8-0ubuntu0.3","1.0.8-0ubuntu0.4","1.0.9-0ubuntu2","1.0.9-0ubuntu3","1.0.10-0ubuntu1","1.0.10-0ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"liblxc1","binary_version":"1.0.10-0ubuntu1.1"},{"binary_name":"lxc","binary_version":"1.0.10-0ubuntu1.1"},{"binary_name":"lxc-dev","binary_version":"1.0.10-0ubuntu1.1"},{"binary_name":"lxc-templates","binary_version":"1.0.10-0ubuntu1.1"},{"binary_name":"lxc-tests","binary_version":"1.0.10-0ubuntu1.1"},{"binary_name":"python3-lxc","binary_version":"1.0.10-0ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47952.json"}},{"package":{"name":"lxc","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/lxc@2.0.11-0ubuntu1~16.04.3+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.4-0ubuntu1","1.1.4-0ubuntu1.1","1.1.4-0ubuntu3","1.1.5-0ubuntu1","1.1.5-0ubuntu2","1.1.5-0ubuntu3","1.1.5-0ubuntu4","1.1.5-0ubuntu5","1.1.5-0ubuntu6","2.0.0~beta2-0ubuntu2","2.0.0~rc1-0ubuntu1","2.0.0~rc2-0ubuntu2","2.0.0~rc3-0ubuntu1","2.0.0~rc3-0ubuntu2","2.0.0~rc3-0ubuntu3","2.0.0~rc4-0ubuntu1","2.0.0~rc5-0ubuntu1","2.0.0~rc9-0ubuntu1","2.0.0~rc10-0ubuntu1","2.0.0~rc10-0ubuntu2","2.0.0~rc11-0ubuntu1","2.0.0~rc12-0ubuntu1","2.0.0~rc13-0ubuntu2","2.0.0~rc14-0ubuntu2","2.0.0~rc15-0ubuntu1","2.0.0-0ubuntu1","2.0.0-0ubuntu2","2.0.1-0ubuntu1~16.04.1","2.0.3-0ubuntu1~ubuntu16.04.1","2.0.4-0ubuntu1~ubuntu16.04.2","2.0.5-0ubuntu1~ubuntu16.04.1","2.0.5-0ubuntu1~ubuntu16.04.2","2.0.5-0ubuntu1~ubuntu16.04.3","2.0.6-0ubuntu1~ubuntu16.04.1","2.0.6-0ubuntu1~ubuntu16.04.2","2.0.7-0ubuntu1~16.04.1","2.0.7-0ubuntu1~16.04.2","2.0.8-0ubuntu1~16.04.2","2.0.11-0ubuntu1~16.04.3","2.0.11-0ubuntu1~16.04.3+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"liblxc1","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lua-lxc","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lxc","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lxc-common","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lxc-dev","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lxc-templates","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lxc-tests","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"lxc1","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"},{"binary_name":"python3-lxc","binary_version":"2.0.11-0ubuntu1~16.04.3+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47952.json"}},{"package":{"name":"lxc","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/lxc@3.0.3-0ubuntu1~18.04.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.0-0ubuntu1","2.1.1-0ubuntu1","3.0.0~beta1-0ubuntu3","3.0.0~beta2-0ubuntu2","3.0.0~beta3-0ubuntu1","3.0.0~beta4-0ubuntu1","3.0.0-0ubuntu1","3.0.0-0ubuntu2","3.0.1-0ubuntu1~18.04.1","3.0.1-0ubuntu1~18.04.2","3.0.2-0ubuntu1~18.04.1","3.0.3-0ubuntu1~18.04.1","3.0.3-0ubuntu1~18.04.3"],"ecosystem_specific":{"binaries":[{"binary_name":"liblxc-common","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"liblxc-dev","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"liblxc1","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"libpam-cgfs","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"lxc","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"lxc-dev","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"lxc-utils","binary_version":"3.0.3-0ubuntu1~18.04.3"},{"binary_name":"lxc1","binary_version":"3.0.3-0ubuntu1~18.04.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47952.json"}},{"package":{"name":"lxc","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/lxc@1:4.0.12-0ubuntu1~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.0.4-0ubuntu1","3.0.4-0ubuntu2","1:4.0.0-0ubuntu2","1:4.0.1-0ubuntu1","1:4.0.1-0ubuntu2","1:4.0.2-0ubuntu1","1:4.0.6-0ubuntu1~20.04.1","1:4.0.12-0ubuntu1~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"liblxc-common","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"liblxc-dev","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"liblxc1","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"libpam-cgfs","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"lxc","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"lxc-dev","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"lxc-utils","binary_version":"1:4.0.12-0ubuntu1~20.04.1"},{"binary_name":"lxc1","binary_version":"1:4.0.12-0ubuntu1~20.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47952.json"}},{"package":{"name":"lxc","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/lxc@1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:4.0.10-0ubuntu5","1:4.0.12-0ubuntu1","1:4.0.12-0ubuntu2","1:5.0.0~git2209-g5a7b9ce67-0ubuntu1","1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"liblxc-common","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"liblxc-dev","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"liblxc1","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"libpam-cgfs","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"lxc","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"lxc-dev","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"lxc-utils","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"},{"binary_name":"lxc1","binary_version":"1:5.0.0~git2209-g5a7b9ce67-0ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47952.json"}},{"package":{"name":"lxc","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/lxc@1:5.0.3-2ubuntu7.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:5.0.1-0ubuntu7","1:5.0.1-0ubuntu8","1:5.0.3-2ubuntu5","1:5.0.3-2ubuntu7","1:5.0.3-2ubuntu7.1","1:5.0.3-2ubuntu7.2"],"ecosystem_specific":{"binaries":[{"binary_name":"liblxc-common","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"liblxc-dev","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"liblxc1t64","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"libpam-cgfs","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"lxc","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"lxc-dev","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"lxc-tests","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"lxc-utils","binary_version":"1:5.0.3-2ubuntu7.2"},{"binary_name":"lxc1","binary_version":"1:5.0.3-2ubuntu7.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-47952.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}