From ${URL} : It was discovered that vzctl, a set of control tools for the OpenVZ server virtualisation solution, determined the storage layout of containers based on the presense of an XML file inside the container. An attacker with local root privileges in a simfs-based container could gain control over ploop-based containers. Further information on the prerequites of such an attack can be found at: https://src.openvz.org/projects/OVZL/repos/vzctl/commits/9e98ea630ac0e88b44e3e23c878a5166aeb74e1c Debian advisory: https://lists.debian.org/debian-security-announce/2015/msg00256.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
$ git tag --contains 9e98ea630ac0e88b44e3e23c878a5166aeb74e1c vzctl-4.10 vzctl-4.9.4 v4.9.4 in tree since https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=193f98bc6b92ba557ddc9cded11df78510d56333 @ Arches, please test and mark stable: =sys-cluster/vzctl-4.9.4
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
New GLSA request filed. @ Maintainer(s): Please cleanup and drop =sys-cluster/vzctl-4.9.1! Created a PR because package currently has no maintainer: https://github.com/gentoo/gentoo/pull/3421
Cleaned up via 957d48bcaba8eac530f1857964976d3aa77f6d7f
This issue was resolved and addressed in GLSA 201701-30 at https://security.gentoo.org/glsa/201701-30 by GLSA coordinator Aaron Bauman (b-man).