USN-1342-1: Linux kernel (Oneiric backport) vulnerability

26 January 2012

The system could be made to run programs as an administrator.




Jüri Aedla discovered that the kernel incorrectly handled /proc//mem
permissions. A local attacker could exploit this and gain root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04

After a standard system update you need to reboot your computer to make
all the necessary changes.


Related notices

  • USN-1336-1: linux-image-3.0.0-15-generic, linux-image-3.0.0-15-server, linux-image-3.0.0-15-powerpc64-smp, linux-image-3.0.0-15-powerpc, linux-image-3.0.0-15-generic-pae, linux, linux-image-3.0.0-15-powerpc-smp, linux-image-3.0.0-15-omap, linux-image-3.0.0-15-virtual
  • USN-1364-1: linux-image-3.0.0-1207-omap4, linux-ti-omap4