ALAS-2015-603 --- kernel perfID: oval:org.secpod.oval:def:1200015 | Date: (C)2016-01-04 (M)2023-12-07 |
Class: PATCH | Family: unix |
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c. Linux kernels built with the name spaces support is vulnerable to a potential privilege escalation flaw. It could occur when a process within a container escapes the intended bind mounts to access the full file system. A privileged user inside a container could use this flaw to potentially gain full privileges on a system
Platform: |
Amazon Linux AMI |