Impact
An unprivileged user can delete a network interface that belongs to another tenant by exploiting an authorization logic flaw in lxc’s lxc-user-nic delete handling. The vulnerable find_line() function can set the deletion flag based on a name match alone, ignoring the ownership, type, and link fields. This constitutes an improper authorization (CWE‑863) that can cause a denial of service by severing networking for a tenant’s containers.
Affected Systems
The flaw exists in lxc before version 7.0.0. Any installation of lxc using the lxc-user-nic helper in a multi‑tenant environment that relies on OpenVSwitch bridges is vulnerable. The mitigation is to upgrade to version 7.0.0 or later; earlier versions lack the fix.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity. Because the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, there is no public evidence of exploitation. Nonetheless, the attack requires an unprivileged user who has been granted a valid lxc‑usernet policy entry and the environment must use OpenVSwitch bridges. Under these conditions a malicious tenant can repeatedly disconnect the networking of another tenant’s containers.
OpenCVE Enrichment