Download
| Alert*
oval:org.secpod.oval:def:109724
Linux Resource Containers provide process and resource isolation without the overhead of full virtualization. oval:org.secpod.oval:def:109729 Linux Resource Containers provide process and resource isolation without the overhead of full virtualization. oval:org.secpod.oval:def:1501190 lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source. oval:org.secpod.oval:def:602280 Roman Fiedler discovered a directory traversal flaw in LXC, the Linux Containers userspace tools. A local attacker with access to a LXC container could exploit this flaw to run programs inside the container that are not confined by AppArmor or expose unintended files in the host to the container. oval:org.secpod.oval:def:52585 lxc: Linux Containers userspace tools LXC could be made to start containers without AppArmor confinement or access the host filesystem. oval:org.secpod.oval:def:89045403 lxc was update to fix one security issue. The following vulnerability was fixed: * CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container oval:org.secpod.oval:def:1501189 lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source. oval:org.secpod.oval:def:702763 lxc: Linux Containers userspace tools LXC could be made to start containers without AppArmor confinement or access the host filesystem. |