lxc (1.1.0~alpha2-0ubuntu3.3) utopic-security; urgency=medium
* SECURITY UPDATE: Arbitrary file creation via unintentional symlink
following when accessing an LXC lock file (LP: #1470842)
- debian/patches/0009-CVE-2015-1331.patch: Use /run/lxc/lock, rather than
/run/lock/lxc, as /run and /run/lxc is only writable by root. Based on
patch from upstream.
- CVE-2015-1131
* SECURITY UPDATE: Container AppArmor/SELinux confinement breakout via
lxc-attach using a potentially malicious container proc filesystem to
initialize confinement (LP: #1475050)
- debian/patches/0010-CVE-2015-1334.patch: Use the host's proc filesystem
to set up AppArmor profile and SELinux domain transitions during
lxc-attach. Based on patch from upstream.
- CVE-2015-1334
Date: 2015-07-17 16:41:15.500591+00:00
Changed-By: Tyler Hicks <tyhi...@canonical.com>
Signed-By: Ubuntu Archive Robot
<cjwatson+ubuntu-archive-ro...@chiark.greenend.org.uk>
https://launchpad.net/ubuntu/+source/lxc/1.1.0~alpha2-0ubuntu3.3
Sorry, changesfile not available.
--
Utopic-changes mailing list
Utopic-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.canonical.com/mailman/listinfo/utopic-changes