Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6441

Опубликовано: 14 фев. 2014
Источник: debian

Описание

The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lxcfixed1.0.0-1package

Примечания

  • getting root on host, if not using unprivileged containers or

  • restricting the containers with apparmor or selinux.

  • CVE is kept as no official documentation explicitly document this fact

  • https://github.com/lxc/lxc/commit/f4d5cc8e1f39d132b61e110674528cac727ae0e2 (lxc-1.0.0.beta2)

Связанные уязвимости

ubuntu
почти 12 лет назад

The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.

redhat
около 12 лет назад

The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.

nvd
почти 12 лет назад

The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.

suse-cvrf
почти 12 лет назад

Security update for lxc

github
больше 3 лет назад

The lxc-sshd template (templates/lxc-sshd.in) in LXC before 1.0.0.beta2 uses read-write permissions when mounting /sbin/init, which allows local users to gain privileges by modifying the init file.