ALAS-2015-544 --- kernel perfID: oval:org.secpod.oval:def:1200158 | Date: (C)2015-12-30 (M)2023-12-07 |
Class: PATCH | Family: unix |
A flaw was found in the way seunshare, a utility for running executables under a different security context, used the capng_lock functionality of the libcap-ng library. The subsequent invocation of suid root binaries that relied on the fact that the setuid system call, among others, also sets the saved set-user-ID when dropping the binaries" process privileges, could allow a local, unprivileged user to potentially escalate their privileges on the system.
Platform: |
Amazon Linux AMI |