ALAS-2016-669 ---- kernel perfID: oval:org.secpod.oval:def:1600366 | Date: (C)2016-05-19 (M)2024-05-04 |
Class: PATCH | Family: unix |
When running as a Xen 64-bit PV guest, user mode processes not supposed to be able to access I/O ports may be granted such permission, potentially resulting in one or more of in-guest privilege escalation, guest crashes , or in-guest information leaks. In some cases, the kernel did not correctly fix backward jumps in a new eBPF program, which could allow arbitrary reads. The kernel incorrectly accounted for the number of in-flight fds over a unix domain socket to the original opener of the file descriptor. Another process could arbitrarily deplete the original file opener"s maximum open files resource limit. A resource-exhaustion vulnerability was found in the kernel, where an unprivileged process could allocate and accumulate far more file descriptors than the process#039; limit. A local, unauthenticated user could exploit this flaw by sending file descriptors over a Unix socket and then closing them to keep the process#039; fd count low, thereby creating kernel-memory or file-descriptors exhaustion
Platform: |
Amazon Linux AMI |