lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1ZzVJH-0007xX-4N@master.debian.org>
Date: Thu, 19 Nov 2015 19:55:59 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3400-1] lxc security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3400-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 19, 2015                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lxc
CVE ID         : CVE-2015-1335
Debian Bug     : 800471

Roman Fiedler discovered a directory traversal flaw in LXC, the Linux
Containers userspace tools. A local attacker with access to a LXC
container could exploit this flaw to run programs inside the container
that are not confined by AppArmor or expose unintended files in the host
to the container.

For the stable distribution (jessie), this problem has been fixed in
version 1:1.0.6-6+deb8u2.

We recommend that you upgrade your lxc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=AVCq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ