ALT-PU-2018-2073-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-6441
The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.
- USN-2104-1
- USN-2104-1
- https://bugs.launchpad.net/ubuntu/%2Bsource/lxc/%2Bbug/1261045
- https://bugs.launchpad.net/ubuntu/%2Bsource/lxc/%2Bbug/1261045
- https://github.com/dotcloud/lxc/pull/1
- https://github.com/dotcloud/lxc/pull/1
- https://github.com/lxc/lxc/commit/f4d5cc8e1f39d132b61e110674528cac727ae0e2
- https://github.com/lxc/lxc/commit/f4d5cc8e1f39d132b61e110674528cac727ae0e2
Modified: 2024-11-21
CVE-2015-1331
lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
- openSUSE-SU-2019:1481
- openSUSE-SU-2019:1481
- openSUSE-SU-2015:1315
- openSUSE-SU-2015:1315
- DSA-3317
- DSA-3317
- 75999
- 75999
- USN-2675-1
- USN-2675-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842
- https://github.com/lxc/lxc/commit/72cf81f6a3404e35028567db2c99a90406e9c6e6
- https://github.com/lxc/lxc/commit/72cf81f6a3404e35028567db2c99a90406e9c6e6
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
Modified: 2024-11-21
CVE-2015-1334
attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
- openSUSE-SU-2019:1481
- openSUSE-SU-2019:1481
- openSUSE-SU-2015:1315
- openSUSE-SU-2015:1315
- openSUSE-SU-2015:1317
- openSUSE-SU-2015:1317
- DSA-3317
- DSA-3317
- 75998
- 75998
- USN-2675-1
- USN-2675-1
- https://github.com/lxc/lxc/commit/5c3fcae78b63ac9dd56e36075903921bd9461f9e
- https://github.com/lxc/lxc/commit/5c3fcae78b63ac9dd56e36075903921bd9461f9e
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
Modified: 2024-11-21
CVE-2015-1335
lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.
- FEDORA-2015-9f8f4b182a
- FEDORA-2015-9f8f4b182a
- FEDORA-2015-211974138f
- FEDORA-2015-211974138f
- FEDORA-2015-ebfe46536f
- FEDORA-2015-ebfe46536f
- openSUSE-SU-2019:1481
- openSUSE-SU-2019:1481
- openSUSE-SU-2015:1717
- openSUSE-SU-2015:1717
- DSA-3400
- DSA-3400
- [oss-security] 20150929 Security issue in LXC (CVE-2015-1335)
- [oss-security] 20150929 Security issue in LXC (CVE-2015-1335)
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76894
- 76894
- USN-2753-1
- USN-2753-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1476662
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1476662
- https://github.com/lxc/lxc/commit/592fd47a6245508b79fe6ac819fe6d3b2c1289be
- https://github.com/lxc/lxc/commit/592fd47a6245508b79fe6ac819fe6d3b2c1289be
- [lxc-devel] 20150929 LXC security issue - affects all supported releases
- [lxc-devel] 20150929 LXC security issue - affects all supported releases
Modified: 2024-11-21
CVE-2016-10124
An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container.
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2015/09/03/5
- http://www.openwall.com/lists/oss-security/2015/09/03/5
- 95404
- 95404
- https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6
- https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6
- GLSA-201711-09
- GLSA-201711-09
Modified: 2024-11-21
CVE-2016-8649
lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
- 94498
- 94498
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
- https://bugzilla.redhat.com/show_bug.cgi?id=1398242
- https://bugzilla.redhat.com/show_bug.cgi?id=1398242
- https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
- https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
- https://security-tracker.debian.org/tracker/CVE-2016-8649
- https://security-tracker.debian.org/tracker/CVE-2016-8649
Modified: 2024-11-21
CVE-2017-5985
lxc-user-nic in Linux Containers (LXC) allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.
- openSUSE-SU-2019:1481
- openSUSE-SU-2019:1481
- [oss-security] 20170309 LXC: CVE-2017-5985: lxc-user-nic didn't verify network namespace ownership
- [oss-security] 20170309 LXC: CVE-2017-5985: lxc-user-nic didn't verify network namespace ownership
- 96777
- 96777
- USN-3224-1
- USN-3224-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1654676
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1654676
- https://github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9
- https://github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9
- [lxc-devel] 20170309 Security fix for CVE-2017-5985 (lxc-user-nic)
- [lxc-devel] 20170309 Security fix for CVE-2017-5985 (lxc-user-nic)