Lucene search

K
osvGoogleOSV:DSA-1011-1
HistoryMar 21, 2005 - 12:00 a.m.

kernel-patch-server, util-vserver - missing attribute support

2005-03-2100:00:00
Google
osv.dev
8

0.002 Low

EPSS

Percentile

59.6%

Several vulnerabilities have been discovered in the Debian vserver
support for Linux. The Common Vulnerabilities and Exposures project
identifies the following problems:

  • CVE-2005-4347
    Bjørn Steinbrink discovered that the chroot barrier is not set
    correctly with util-vserver which may result in unauthorised
    escapes from a vserver to the host system.

This vulnerability is limited to the 2.4 kernel patch included in
kernel-patch-vserver. The correction to this problem requires
updating the util-vserver package as well and installing a new
kernel built from the updated kernel-patch-vserver package.

  • CVE-2005-4418
    The default policy of util-vserver is set to trust all unknown
    capabilities instead of considering them as insecure.

The old stable distribution (woody) does not contain a
kernel-patch-vserver package.

For the stable distribution (sarge) this problem has been fixed in
version 1.9.5.5 of kernel-patch-vserver and in version
0.30.204-5sarge3 of util-vserver.

For the unstable distribution (sid) this problem has been fixed in
version 2.3 of kernel-patch-vserver and in version 0.30.208-1 of
util-vserver.

We recommend that you upgrade your util-vserver and
kernel-patch-vserver packages and build a new kernel immediately.

CPENameOperatorVersion
util-vservereq0.30.204-5sarge2

0.002 Low

EPSS

Percentile

59.6%