* SECURITY UPDATE: Arbitrary file creation via unintentional symlink
following when accessing an LXC lock file (LP: #1470842)
- debian/patches/0009-CVE-2015-1331.patch: Use /run/lxc/lock, rather than
/run/lock/lxc, as /run and /run/lxc is only writable by root. Based on
patch from upstream.
- CVE-2015-1131
* SECURITY UPDATE: Container AppArmor/SELinux confinement breakout via
lxc-attach using a potentially malicious container proc filesystem to
initialize confinement (LP: #1475050)
- debian/patches/0010-CVE-2015-1334.patch: Use the host's proc filesystem
to set up AppArmor profile and SELinux domain transitions during
lxc-attach. Based on patch from upstream.
- CVE-2015-1334
This bug was fixed in the package lxc - 1.1.0~alpha2- 0ubuntu3. 3
--------------- alpha2- 0ubuntu3. 3) utopic-security; urgency=medium
lxc (1.1.0~
* SECURITY UPDATE: Arbitrary file creation via unintentional symlink patches/ 0009-CVE- 2015-1331. patch: Use /run/lxc/lock, rather than run/lock/ lxc, as /run and /run/lxc is only writable by root. Based on patches/ 0010-CVE- 2015-1334. patch: Use the host's proc filesystem
following when accessing an LXC lock file (LP: #1470842)
- debian/
/
patch from upstream.
- CVE-2015-1131
* SECURITY UPDATE: Container AppArmor/SELinux confinement breakout via
lxc-attach using a potentially malicious container proc filesystem to
initialize confinement (LP: #1475050)
- debian/
to set up AppArmor profile and SELinux domain transitions during
lxc-attach. Based on patch from upstream.
- CVE-2015-1334
-- Tyler Hicks <email address hidden> Fri, 17 Jul 2015 10:57:56 -0500