Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-8649

Опубликовано: 01 мая 2017
Источник: debian

Описание

lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lxcfixed1:2.0.6-1package
lxcfixed1:1.0.6-6+deb8u5jessiepackage
lxcno-dsawheezypackage

Примечания

  • Fixed by: https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c

  • Details: https://launchpad.net/bugs/1639345

  • To be complete this needs as well changes to src:linux

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 9 лет назад

lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.

CVSS3: 9.1
nvd
почти 9 лет назад

lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.

suse-cvrf
около 9 лет назад

Security update for lxc

CVSS3: 9.1
github
больше 3 лет назад

lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.