[ubuntu/vivid-security] lxc 1.1.2-0ubuntu3.1 (Accepted)
Tyler Hicks
tyhicks at canonical.com
Wed Jul 22 14:12:35 UTC 2015
lxc (1.1.2-0ubuntu3.1) vivid-security; urgency=medium
* SECURITY UPDATE: Arbitrary file creation via unintentional symlink
following when accessing an LXC lock file (LP: #1470842)
- debian/patches/0008-CVE-2015-1331.patch: Use /run/lxc/lock, rather than
/run/lock/lxc, as /run and /run/lxc is only writable by root. Based on
patch from upstream.
- CVE-2015-1131
* SECURITY UPDATE: Container AppArmor/SELinux confinement breakout via
lxc-attach using a potentially malicious container proc filesystem to
initialize confinement (LP: #1475050)
- debian/patches/0009-CVE-2015-1334.patch: Use the host's proc filesystem
to set up AppArmor profile and SELinux domain transitions during
lxc-attach. Based on patch from upstream.
- CVE-2015-1334
Date: 2015-07-17 16:41:12.259601+00:00
Changed-By: Tyler Hicks <tyhicks at canonical.com>
https://launchpad.net/ubuntu/+source/lxc/1.1.2-0ubuntu3.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Vivid-changes
mailing list