[USN-1342-1] Linux kernel (Oneiric backport) vulnerability
John Johansen
john.johansen at canonical.com
Thu Jan 26 03:27:46 UTC 2012
==========================================================================
Ubuntu Security Notice USN-1342-1
January 26, 2012
linux-lts-backport-oneiric vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
The system could be made to run programs as an administrator.
Software Description:
- linux-lts-backport-oneiric: Linux kernel backport from Oneiric
Details:
Jüri Aedla discovered that the kernel incorrectly handled /proc/<pid>/mem
permissions. A local attacker could exploit this and gain root privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-3.0.0-15-generic 3.0.0-15.26~lucid1
linux-image-3.0.0-15-generic-pae 3.0.0-15.26~lucid1
linux-image-3.0.0-15-server 3.0.0-15.26~lucid1
linux-image-3.0.0-15-virtual 3.0.0-15.26~lucid1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1342-1
CVE-2012-0056
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-backport-oneiric/3.0.0-15.26~lucid1
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: Attached Message Part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20120125/82fe92b6/attachment.ksh>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 900 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20120125/82fe92b6/attachment.sig>
More information about the ubuntu-security-announce
mailing list