Debian: DSA-3357-1: vzctl security update
Debian: DSA-3357-1: vzctl security update
It was discovered that vzctl, a set of control tools for the OpenVZ server virtualisation solution, determined the storage layout of containers based on the presense of an XML file inside the container. An attacker with local root privileges in a simfs-based container
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3357-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Moritz Muehlenhoff September 13, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : vzctl CVE ID : not yet available It was discovered that vzctl, a set of control tools for the OpenVZ server virtualisation solution, determined the storage layout of containers based on the presense of an XML file inside the container. An attacker with local root privileges in a simfs-based container could gain control over ploop-based containers. Further information on the prerequites of such an attack can be found at https://src.openvz.org/projects/OVZL/repos/vzctl/commits/9e98ea630ac0e88b44e3e23c878a5166aeb74e1c The oldstable distribution (wheezy) is not affected. For the stable distribution (jessie), this problem has been fixed in version 4.8-1+deb8u2. During the update existing configurations are automatically updated. For the testing distribution (stretch), this problem has been fixed in version 4.9.4-2. For the unstable distribution (sid), this problem has been fixed in version 4.9.4-2. We recommend that you upgrade your vzctl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.