DSA-3357-1 vzctl -- security update

Related Vulnerabilities: CVE-2015-6927  

It was discovered that vzctl, a set of control tools for the OpenVZ server virtualisation solution, determined the storage layout of containers based on the presence of an XML file inside the container. An attacker with local root privileges in a simfs-based container could gain control over ploop-based containers. Further information on the prerequisites of such an attack can be found at src.openvz.org. The oldstable distribution (wheezy) is not affected. For the stable distribution (jessie), this problem has been fixed in version 4.8-1+deb8u2. During the update existing configurations are automatically updated. For the testing distribution (stretch), this problem has been fixed in version 4.9.4-2. For the unstable distribution (sid), this problem has been fixed in version 4.9.4-2. We recommend that you upgrade your vzctl packages.

Debian Security Advisory

DSA-3357-1 vzctl -- security update

Date Reported:
13 Sep 2015
Affected Packages:
vzctl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2015-6927.
More information:

It was discovered that vzctl, a set of control tools for the OpenVZ server virtualisation solution, determined the storage layout of containers based on the presence of an XML file inside the container. An attacker with local root privileges in a simfs-based container could gain control over ploop-based containers. Further information on the prerequisites of such an attack can be found at src.openvz.org.

The oldstable distribution (wheezy) is not affected.

For the stable distribution (jessie), this problem has been fixed in version 4.8-1+deb8u2. During the update existing configurations are automatically updated.

For the testing distribution (stretch), this problem has been fixed in version 4.9.4-2.

For the unstable distribution (sid), this problem has been fixed in version 4.9.4-2.

We recommend that you upgrade your vzctl packages.