Computer Security
[EN] securityvulns.ru no-pyccku


LXC directory traversal
Published:27.07.2015
Source:
SecurityVulns ID:14608
Type:local
Threat Level:
5/10
Description:Directory traversal on lock files creation.
Affected:LXC : LXC 1.1
CVE:CVE-2015-1335 (lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.)
 CVE-2015-1334 (attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a poc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.)
 CVE-2015-1331 (lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.)
Original documentdocumentUBUNTU, [USN-2675-1] LXC vulnerabilities (27.07.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod