Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-52890

Опубликовано: 25 июн. 2025
Источник: debian

Описание

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
incusnot-affectedpackage

Примечания

  • https://github.com/lxc/incus/security/advisories/GHSA-p7fw-vjjm-2rwp

  • Introduced with: https://github.com/lxc/incus/commit/d137a063c2fe2a6983c995ba75c03731bee1557d (v6.12.0)

  • Fixed by: https://github.com/lxc/incus/commit/254dfd2483ab8de39b47c2258b7f1cf0759231c8

Связанные уязвимости

CVSS3: 8.1
ubuntu
2 месяца назад

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.

CVSS3: 8.1
nvd
2 месяца назад

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.

CVSS3: 8.1
github
2 месяца назад

Incus creates nftables rules that partially bypass security options