Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus versions 6.12 and 6.13generates nftables rules that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to ARP spoofing on the bridge and to fully spoof another VM/container on the same bridge. Commit 254dfd2483ab8de39b47c2258b7f1cf0759231c8 contains a patch for the issue.
References
Configurations
No configuration.
History
26 Jun 2025, 18:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Jun 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lxc/incus/security/advisories/GHSA-p7fw-vjjm-2rwp - |
25 Jun 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-25 17:15
Updated : 2025-06-26 18:57
NVD link : CVE-2025-52890
Mitre link : CVE-2025-52890
CVE.ORG link : CVE-2025-52890
JSON object : View
Products Affected
No product.
CWE
CWE-863
Incorrect Authorization