** Changed in: linux-snapdragon (Ubuntu Precise) Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Wily) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Yakkety) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Yakkety) Importance: Undecided => Medium ** Changed in: linux-snapdragon (Ubuntu Trusty) Status: New => Invalid ** Changed in: linux-snapdragon (Ubuntu Trusty) Importance: Undecided => Medium ** Description changed: - It was discovered that Linux incorrectly accounted the number of in- - flight fds over a unix domain socket to the original opener of the file- - descriptor. This allows another process to arbitrary deplete the - original file-openers resource limit for the maximum of open files. - Instead the sending processes and its struct cred should be credited. + The Linux kernel before 4.5 allows local users to bypass file-descriptor + limits and cause a denial of service (memory consumption) by leveraging + incorrect tracking of descriptor ownership and sending each descriptor + over a UNIX socket before closing it. NOTE: this vulnerability exists + because of an incorrect fix for CVE-2013-4312. Break-Fix: 712f4aad406bb1ed67f3f98d04c044191f0ff593 415e3d3e90ce9e18727e8843ae343eda5a58fad6 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1549203 Title: CVE-2016-2550 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1549203/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs