๐Ÿ” CVE Alert

CVE-2026-39402

UNKNOWN 0.0

lxc lxc-user-nic insufficient ownership validation allows cross-tenant OVS port deletion

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

lxc is a Linux container runtime. In the setuid helper lxc-user-nic, the delete path contains a logic flaw in the find_line() function that allows an unprivileged user to delete OVS-attached network interfaces belonging to other users. When lxc-user-nic delete scans its NIC database to authorize a deletion request, the interface name comparison can set the authorization flag based on a name match alone, even when the ownership, type, and link fields in that database entry belong to a different user. The vulnerable check sits after the goto next label handling, meaning it is reachable on lines where earlier ownership checks failed or were skipped. Because nothing downstream of this authorization signal re-verifies that the matched database line actually belongs to the caller, an unprivileged attacker with a valid lxc-usernet policy entry can trigger deletion of another user's OVS port on the same bridge. This is limited to multi-tenant environments using lxc-user-nic with OpenVSwitch bridges. The impact is denial of service - one tenant can repeatedly disconnect networking from containers run by another tenant on shared infrastructure. This is patched in version 7.0.0.

CWE CWE-863
Vendor lxc
Product lxc
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for lxc lxc

Be the first to know when new unknown vulnerabilities affecting lxc lxc are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

lxc / lxc
< 7.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/lxc/lxc/security/advisories/GHSA-3m9j-g9gc-vcvq