USN-6738-1: LXD vulnerability

Publication date

22 April 2024

Overview

LXD could be made to bypass integrity checks if it received specially crafted input.


Packages

  • lxd - Container hypervisor based on LXC

Details

Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that LXD
incorrectly handled the handshake phase and the use of sequence numbers in SSH
Binary Packet Protocol (BPP). If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could possibly
use this issue to bypass integrity checks.

Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that LXD
incorrectly handled the handshake phase and the use of sequence numbers in SSH
Binary Packet Protocol (BPP). If a user or an automated system were tricked
into opening a specially crafted input file, a remote attacker could possibly
use this issue to bypass integrity checks.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
18.04 bionic lxd –  3.0.3-0ubuntu1~18.04.2+esm1  
lxd-client –  3.0.3-0ubuntu1~18.04.2+esm1  
lxd-tools –  3.0.3-0ubuntu1~18.04.2+esm1  
16.04 xenial golang-github-lxc-lxd-dev –  2.0.11-0ubuntu1~16.04.4+esm1  
lxc2 –  2.0.11-0ubuntu1~16.04.4+esm1  
lxd –  2.0.11-0ubuntu1~16.04.4+esm1  
lxd-client –  2.0.11-0ubuntu1~16.04.4+esm1  
lxd-tools –  2.0.11-0ubuntu1~16.04.4+esm1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›