** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Xenial)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Yakkety)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Yakkety)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Trusty)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Trusty)
Importance: Undecided => Medium
** Description changed:
- It was discovered that Linux incorrectly accounted the number of in-
- flight fds over a unix domain socket to the original opener of the file-
- descriptor. This allows another process to arbitrary deplete the
- original file-openers resource limit for the maximum of open files.
- Instead the sending processes and its struct cred should be credited.
+ The Linux kernel before 4.5 allows local users to bypass file-descriptor
+ limits and cause a denial of service (memory consumption) by leveraging
+ incorrect tracking of descriptor ownership and sending each descriptor
+ over a UNIX socket before closing it. NOTE: this vulnerability exists
+ because of an incorrect fix for CVE-2013-4312.
Break-Fix: 712f4aad406bb1ed67f3f98d04c044191f0ff593
415e3d3e90ce9e18727e8843ae343eda5a58fad6
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1549203
Title:
CVE-2016-2550
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1549203/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs