Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in LXD
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in LXD
ID: USN-2988-1
Distribution: Ubuntu
Plattformen: Ubuntu 15.10, Ubuntu 16.04 LTS
Datum: Di, 31. Mai 2016, 23:28
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1582
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1581
Applikationen: LXD

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1683130575762759543==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="hhSPSeRrAhTT4iwi8FvO54pl5oC5m8WR5"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--hhSPSeRrAhTT4iwi8FvO54pl5oC5m8WR5
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2988-1
May 31, 2016

lxd vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10

Summary:

Several security issues were fixed in LXD.

Software Description:
- lxd: Container hypervisor based on LXC

Details:

Robie Basak discovered that LXD incorrectly set permissions when setting up
a loop based ZFS pool. A local attacker could use this issue to copy and
read the data of any LXD container. (CVE-2016-1581)

Robie Basak discovered that LXD incorrectly set permissions when switching
an unprivileged container into privileged mode. A local attacker could use
this issue to access any world readable path in the container directory,
including setuid binaries. (CVE-2016-1582)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
lxd 2.0.2-0ubuntu1~16.04.1

Ubuntu 15.10:
lxd 0.20-0ubuntu4.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2988-1
CVE-2016-1581, CVE-2016-1582

Package Information:
https://launchpad.net/ubuntu/+source/lxd/2.0.2-0ubuntu1~16.04.1
https://launchpad.net/ubuntu/+source/lxd/0.20-0ubuntu4.2



--hhSPSeRrAhTT4iwi8FvO54pl5oC5m8WR5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=01s6
-----END PGP SIGNATURE-----

--hhSPSeRrAhTT4iwi8FvO54pl5oC5m8WR5--


--===============1683130575762759543==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1683130575762759543==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung