Bug 2466903 (CVE-2026-39402) - CVE-2026-39402 lxc: lxc-user-nic: OpenVSwitch: LXC: Denial of Service in lxc-user-nic due to logic flaw in network interface deletion
Summary: CVE-2026-39402 lxc: lxc-user-nic: OpenVSwitch: LXC: Denial of Service in lxc-...
Keywords:
Status: NEW
Alias: CVE-2026-39402
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2477883 2477886
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-05 21:01 UTC by OSIDB Bzimport
Modified: 2026-05-15 13:43 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-05 21:01:20 UTC
lxc is a Linux container runtime. In the setuid helper lxc-user-nic, the delete path contains a logic flaw in the find_line() function that allows an unprivileged user to delete OVS-attached network interfaces belonging to other users. When lxc-user-nic delete scans its NIC database to authorize a deletion request, the interface name comparison can set the authorization flag based on a name match alone, even when the ownership, type, and link fields in that database entry belong to a different user. The vulnerable check sits after the goto next label handling, meaning it is reachable on lines where earlier ownership checks failed or were skipped. Because nothing downstream of this authorization signal re-verifies that the matched database line actually belongs to the caller, an unprivileged attacker with a valid lxc-usernet policy entry can trigger deletion of another user's OVS port on the same bridge. 

This is limited to multi-tenant environments using lxc-user-nic with OpenVSwitch bridges. The impact is denial of service - one tenant can repeatedly disconnect networking from containers run by another tenant on shared infrastructure. This is patched in version 7.0.0.


Note You need to log in before you can comment on or make changes to this bug.