First published: Wed Nov 23 2016(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2016-8649">CVE-2016-8649</a> was assigned to the issue that allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls. The file descriptor is needed to write to /proc/<PID>/attr/current or /proc/<PID>/attr/exec to set the AppArmor/SELinux label of the attached process. Upstream bug: <a href="https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345">https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345</a> Upstream patch: <a href="https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c">https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c</a> References: <a href="http://seclists.org/oss-sec/2016/q4/515">http://seclists.org/oss-sec/2016/q4/515</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lxc | <=1:1.0.6-6+deb8u4<=1:2.0.5-3<=1:1.0.6-6+deb8u3 | 1:2.0.6-1 1:1.0.6-6+deb8u5 |
Linuxcontainers Lxc | <1.0.9 | |
Linuxcontainers Lxc | >=2.0.0<2.0.6 | |
debian/lxc | 1:4.0.6-2+deb11u2 1:5.0.2-1+deb12u2 1:6.0.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.