2015-09-16
ALT-BU-2015-2641-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2015-08-26
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-3239
Off-by-one error in the dwarf_to_unw_regnum function in include/dwarf_i.h in libunwind 1.1 allows local users to have unspecified impact via invalid dwarf opcodes.
Severity: LOW (3.3)
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N
References:
- http://git.savannah.gnu.org/cgit/libunwind.git/commit/?id=396b6c7ab737e2bff244d640601c436a26260ca1
- http://rhn.redhat.com/errata/RHSA-2015-1675.html
- http://rhn.redhat.com/errata/RHSA-2015-1768.html
- http://rhn.redhat.com/errata/RHSA-2015-1769.html
- http://www.securityfocus.com/bid/76707
- https://bugzilla.redhat.com/show_bug.cgi?id=1232265
- http://git.savannah.gnu.org/cgit/libunwind.git/commit/?id=396b6c7ab737e2bff244d640601c436a26260ca1
- http://rhn.redhat.com/errata/RHSA-2015-1675.html
- http://rhn.redhat.com/errata/RHSA-2015-1768.html
- http://rhn.redhat.com/errata/RHSA-2015-1769.html
- http://www.securityfocus.com/bid/76707
- https://bugzilla.redhat.com/show_bug.cgi?id=1232265
Closed vulnerabilities
Published: 2015-08-12
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-1331
lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
Severity: MEDIUM (4.9)
Vector: AV:L/AC:L/Au:N/C:N/I:C/A:N
References:
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75999
- http://www.ubuntu.com/usn/USN-2675-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842
- https://github.com/lxc/lxc/commit/72cf81f6a3404e35028567db2c99a90406e9c6e6
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75999
- http://www.ubuntu.com/usn/USN-2675-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842
- https://github.com/lxc/lxc/commit/72cf81f6a3404e35028567db2c99a90406e9c6e6
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
Published: 2015-08-12
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2015-1334
attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
Severity: MEDIUM (4.6)
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
References:
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00067.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75998
- http://www.ubuntu.com/usn/USN-2675-1
- https://github.com/lxc/lxc/commit/5c3fcae78b63ac9dd56e36075903921bd9461f9e
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00067.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75998
- http://www.ubuntu.com/usn/USN-2675-1
- https://github.com/lxc/lxc/commit/5c3fcae78b63ac9dd56e36075903921bd9461f9e
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html