Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#38889 - [lxc] security patch for CVE-2013-6441
Attached to Project:
Community Packages
Opened by RbN (RbN) - Thursday, 13 February 2014, 12:05 GMT
Last edited by Sergej Pupykin (sergej) - Friday, 14 February 2014, 09:32 GMT
Opened by RbN (RbN) - Thursday, 13 February 2014, 12:05 GMT
Last edited by Sergej Pupykin (sergej) - Friday, 14 February 2014, 09:32 GMT
|
DetailsDescription(from Ubuntu launchpad [0]):
"Being logged in inside a container that was created with the lxc-sshd template the mount of $rootfs/sbin/init allows to modify the init script of the container. So harm could be done to the host system at the next execution of lxc-start or lxc-create -t sshd. This can be used to gain root access since lxc is likely to be run by root." Resolution: upstream patch [1] Ressources: [0] https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1261045 [1] https://github.com/lxc/lxc/commit/f4d5cc8e1f39d132b61e110674528cac727ae0e2 |
This task depends upon
Closed by Sergej Pupykin (sergej)
Friday, 14 February 2014, 09:32 GMT
Reason for closing: Fixed
Additional comments about closing: applied
Friday, 14 February 2014, 09:32 GMT
Reason for closing: Fixed
Additional comments about closing: applied