Skip to content

Conversation

stgraber
Copy link
Member

This fixes a couple of recent regressions (Incus 6.12 and 6.13) in how isolation rules are applied when combined with ACLs. Those specifically affect environments using nftables and bridge networking alongside the aforementioned isolation rules.

Thanks to Olivier BAL-PETRE of ANSSI (French Cybersecurity Agency) for reporting those and providing fixes for both issues!

Relevant security issues:

Commit d137a06 changed the rule
ordering and bypassed some of the MAC/IPv4/IPv6 filtering.

This made possible to ARP spoof another VM/container and fully
spoof it on a bridge.

This is a security fix:

 - CVE-2025-52890
 - GHSA-p7fw-vjjm-2rwp

Signed-off-by: Olivier Bal-Petre <[email protected]>
Acked-by: Stéphane Graber <[email protected]>
Commit a7c3330 added basic
rules that bypass some of the MAC/IPv4/IPv6 filtering, allowing
to exhaust the DHCP pool and open the door for other attacks
on the bridge.

This is a security fix:

 - CVE-2025-52889
 - GHSA-9q7c-qmhm-jv86

Signed-off-by: Olivier Bal-Petre <[email protected]>
Acked-by: Stéphane Graber <[email protected]>
@stgraber stgraber merged commit 6a5c119 into lxc:main Jun 25, 2025
236 of 242 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants