7.2
CVSSv2

CVE-2015-1335

Published: 01/10/2015 Updated: 31/05/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

lxc-start in lxc prior to 1.0.8 and 1.1.x prior to 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.

Vulnerable Product Search on Vulmon Subscribe to Product

linuxcontainers lxc 1.1.2

linuxcontainers lxc 1.1.3

linuxcontainers lxc

linuxcontainers lxc 1.1.0

linuxcontainers lxc 1.1.1

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

Vendor Advisories

Debian Bug report logs - #800471 lxc: CVE-2015-1335 Package: src:lxc; Maintainer for src:lxc is pkg-lxc <pkg-lxc-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 29 Sep 2015 20:36:01 UTC Severity: serious Tags: fixed-upstream, patch, security, upstream Found in version ...
LXC could be made to start containers without AppArmor confinement or access the host filesystem ...
Roman Fiedler discovered a directory traversal flaw in LXC, the Linux Containers userspace tools A local attacker with access to a LXC container could exploit this flaw to run programs inside the container that are not confined by AppArmor or expose unintended files in the host to the container For the stable distribution (jessie), this problem h ...