Upstream information

CVE-2025-52889 at MITRE

Description

Incus is a system container and virtual machine manager. When using an ACL on a device connected to a bridge, Incus version 6.12 and 6.13 generates nftables rules for local services (DHCP, DNS...) that partially bypass security options `security.mac_filtering`, `security.ipv4_filtering` and `security.ipv6_filtering`. This can lead to DHCP pool exhaustion and opens the door for other attacks. A patch is available at commit 2516fb19ad8428454cb4edfe70c0a5f0dc1da214.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  CNA (GitHub)
Base Score 3.4
Vector CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required High
User Interaction None
Scope Changed
Confidentiality Impact None
Integrity Impact None
Availability Impact Low
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1245365 [NEW]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • govulncheck-vulndb >= 0.0.20250730T213748-1.1
  • incus >= 6.14-1.1
  • incus-bash-completion >= 6.14-1.1
  • incus-fish-completion >= 6.14-1.1
  • incus-tools >= 6.14-1.1
  • incus-zsh-completion >= 6.14-1.1
Patchnames:
openSUSE-Tumbleweed-2025-15317
openSUSE-Tumbleweed-2025-15405


SUSE Timeline for this CVE

CVE page created: Wed Jun 25 20:44:50 2025
CVE page last modified: Wed Aug 6 12:39:09 2025