ALT-PU-2018-2073-1
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-6441
The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.
- http://www.ubuntu.com/usn/USN-2104-1
- https://bugs.launchpad.net/ubuntu/%2Bsource/lxc/%2Bbug/1261045
- https://github.com/dotcloud/lxc/pull/1
- https://github.com/lxc/lxc/commit/f4d5cc8e1f39d132b61e110674528cac727ae0e2
- http://www.ubuntu.com/usn/USN-2104-1
- https://bugs.launchpad.net/ubuntu/%2Bsource/lxc/%2Bbug/1261045
- https://github.com/dotcloud/lxc/pull/1
- https://github.com/lxc/lxc/commit/f4d5cc8e1f39d132b61e110674528cac727ae0e2
Modified: 2025-04-12
CVE-2015-1331
lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75999
- http://www.ubuntu.com/usn/USN-2675-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842
- https://github.com/lxc/lxc/commit/72cf81f6a3404e35028567db2c99a90406e9c6e6
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75999
- http://www.ubuntu.com/usn/USN-2675-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1470842
- https://github.com/lxc/lxc/commit/72cf81f6a3404e35028567db2c99a90406e9c6e6
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
Modified: 2025-04-12
CVE-2015-1334
attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00067.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75998
- http://www.ubuntu.com/usn/USN-2675-1
- https://github.com/lxc/lxc/commit/5c3fcae78b63ac9dd56e36075903921bd9461f9e
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00066.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00067.html
- http://www.debian.org/security/2015/dsa-3317
- http://www.securityfocus.com/bid/75998
- http://www.ubuntu.com/usn/USN-2675-1
- https://github.com/lxc/lxc/commit/5c3fcae78b63ac9dd56e36075903921bd9461f9e
- https://service.ait.ac.at/security/2015/LxcSecurityAnalysis.html
Modified: 2025-04-12
CVE-2015-1335
lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170045.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171358.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171364.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00023.html
- http://www.debian.org/security/2015/dsa-3400
- http://www.openwall.com/lists/oss-security/2015/09/29/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76894
- http://www.ubuntu.com/usn/USN-2753-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1476662
- https://github.com/lxc/lxc/commit/592fd47a6245508b79fe6ac819fe6d3b2c1289be
- https://lists.linuxcontainers.org/pipermail/lxc-devel/2015-September/012434.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170045.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171358.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171364.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00023.html
- http://www.debian.org/security/2015/dsa-3400
- http://www.openwall.com/lists/oss-security/2015/09/29/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76894
- http://www.ubuntu.com/usn/USN-2753-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1476662
- https://github.com/lxc/lxc/commit/592fd47a6245508b79fe6ac819fe6d3b2c1289be
- https://lists.linuxcontainers.org/pipermail/lxc-devel/2015-September/012434.html
Modified: 2025-04-20
CVE-2016-10124
An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container.
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2015/09/03/5
- http://www.securityfocus.com/bid/95404
- https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6
- https://security.gentoo.org/glsa/201711-09
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2015/09/03/5
- http://www.securityfocus.com/bid/95404
- https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6
- https://security.gentoo.org/glsa/201711-09
Modified: 2025-04-20
CVE-2016-8649
lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
- http://www.securityfocus.com/bid/94498
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
- https://bugzilla.redhat.com/show_bug.cgi?id=1398242
- https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
- https://security-tracker.debian.org/tracker/CVE-2016-8649
- http://www.securityfocus.com/bid/94498
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
- https://bugzilla.redhat.com/show_bug.cgi?id=1398242
- https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
- https://security-tracker.debian.org/tracker/CVE-2016-8649
Modified: 2025-04-20
CVE-2017-5985
lxc-user-nic in Linux Containers (LXC) allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://www.openwall.com/lists/oss-security/2017/03/09/4
- http://www.securityfocus.com/bid/96777
- http://www.ubuntu.com/usn/USN-3224-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1654676
- https://github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9
- https://lists.linuxcontainers.org/pipermail/lxc-devel/2017-March/015535.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://www.openwall.com/lists/oss-security/2017/03/09/4
- http://www.securityfocus.com/bid/96777
- http://www.ubuntu.com/usn/USN-3224-1
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1654676
- https://github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9
- https://lists.linuxcontainers.org/pipermail/lxc-devel/2017-March/015535.html