[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-603 --- kernel perf

ID: oval:org.secpod.oval:def:1200015Date: (C)2016-01-04   (M)2023-12-07
Class: PATCHFamily: unix




Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. Linux kernels built with the name spaces support is vulnerable to a potential privilege escalation flaw. It could occur when a process within a container escapes the intended bind mounts to access the full file system. A privileged user inside a container could use this flaw to potentially gain full privileges on a system

Platform:
Amazon Linux AMI
Product:
kernel
perf
Reference:
ALAS-2015-603
CVE-2017-1000253
CVE-2015-8787
CVE-2015-7613
CVE-2015-2925
CVE    4
CVE-2017-1000253
CVE-2015-2925
CVE-2015-7613
CVE-2015-8787
...
CPE    5
cpe:/o:amazon:linux
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
cpe:/o:linux:linux_kernel:4.2.3
...

© SecPod Technologies