lxc is vulnerable to authorization bypass. The vulnerability exists through missing functional level access which allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.
lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
www.openwall.com/lists/oss-security/2017/03/09/4
www.securityfocus.com/bid/96777
www.ubuntu.com/usn/USN-3224-1
bugs.launchpad.net/ubuntu/+source/lxc/+bug/1654676
github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9
lists.linuxcontainers.org/pipermail/lxc-devel/2017-March/015535.html
security-tracker.debian.org/tracker/CVE-2017-5985