Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
Roman Fiedler discovered that LXC had a directory traversal flaw when
creating lock files. A local attacker could exploit this flaw to
create an arbitrary file as the root user. (CVE-2015-1331)
Roman Fiedler discovered that LXC incorrectly trusted the container's
proc filesystem to set up AppArmor profile changes and SELinux domain
transitions. A local attacker could exploit this flaw to run programs
inside the container that are not confined by AppArmor or SELinux.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected liblxc1 and / or lxc packages.
Risk factor :
Medium / CVSS Base Score : 4.9
CVSS Temporal Score : 3.6
Public Exploit Available : false