what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3317-1

Debian Security Advisory 3317-1
Posted Jul 27, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3317-1 - Several vulnerabilities have been discovered in LXC, the Linux Containers userspace tools.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-1331, CVE-2015-1334
SHA-256 | 0c757887b859f350dc7059ceb18c56f376fff07f6d2055c9c9184bfdc54423ec

Debian Security Advisory 3317-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3317-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 25, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : lxc
CVE ID : CVE-2015-1331 CVE-2015-1334
Debian Bug : 793298

Several vulnerabilities have been discovered in LXC, the Linux
Containers userspace tools. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2015-1331

Roman Fiedler discovered a directory traversal flaw in LXC when
creating lock files. A local attacker could exploit this flaw to
create an arbitrary file as the root user.

CVE-2015-1334

Roman Fiedler discovered that LXC incorrectly trusted the
container's proc filesystem to set up AppArmor profile changes and
SELinux domain transitions. A malicious container could create a
fake proc filesystem and use this flaw to run programs inside the
container that are not confined by AppArmor or SELinux.

For the stable distribution (jessie), these problems have been fixed in
version 1:1.0.6-6+deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 1:1.0.7-4.

For the unstable distribution (sid), these problems have been fixed in
version 1:1.0.7-4.

We recommend that you upgrade your lxc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=mtWe
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close