Your submission was sent successfully! Close

USN-1342-1: Linux kernel (Oneiric backport) vulnerability

26 January 2012

The system could be made to run programs as an administrator.




Jüri Aedla discovered that the kernel incorrectly handled /proc//mem
permissions. A local attacker could exploit this and gain root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04

After a standard system update you need to reboot your computer to make
all the necessary changes.


Related notices

  • USN-1364-1: linux-ti-omap4, linux-image-3.0.0-1207-omap4
  • USN-1336-1: linux-image-3.0.0-15-powerpc, linux, linux-image-3.0.0-15-powerpc64-smp, linux-image-3.0.0-15-generic, linux-image-3.0.0-15-powerpc-smp, linux-image-3.0.0-15-virtual, linux-image-3.0.0-15-omap, linux-image-3.0.0-15-server, linux-image-3.0.0-15-generic-pae