Your submission was sent successfully! Close

USN-1736-1: Linux kernel vulnerability

22 February 2013

The system could be made to run programs as an administrator.

Releases

Packages

Details

Suleiman Souhlal, Salman Qazi, Aaron Durbin and Michael Davidson discovered
a race condition in the Linux kernel's ptrace syscall. An unprivileged
local attacker could exploit this flaw to run programs as an administrator.

References

Related notices

  • USN-1739-1: linux-image-3.0.0-31-omap, linux-image-3.0.0-31-server, linux-image-3.0.0-31-powerpc, linux-image-3.0.0-31-generic-pae, linux-image-3.0.0-31-powerpc64-smp, linux, linux-image-3.0.0-31-virtual, linux-image-3.0.0-31-generic, linux-image-3.0.0-31-powerpc-smp
  • USN-1738-1: linux-image-3.0.0-31-server, linux-image-3.0.0-31-generic-pae, linux-image-3.0.0-31-virtual, linux-image-3.0.0-31-generic, linux-lts-backport-oneiric
  • USN-1743-1: linux-image-3.5.0-25-generic, linux-lts-quantal
  • USN-1742-1: linux-ti-omap4, linux-image-3.2.0-1426-omap4
  • USN-1745-1: linux-ti-omap4, linux-image-3.5.0-220-omap4
  • USN-1740-1: linux-ti-omap4, linux-image-3.0.0-1221-omap4
  • USN-1741-1: linux-image-3.2.0-38-omap, linux, linux-image-3.2.0-38-powerpc64-smp, linux-image-3.2.0-38-generic, linux-image-3.2.0-38-powerpc-smp, linux-image-3.2.0-38-highbank, linux-image-3.2.0-38-generic-pae, linux-image-3.2.0-38-virtual
  • USN-1737-1: linux-image-2.6.32-350-ec2, linux-ec2
  • USN-1744-1: linux-image-3.5.0-25-generic, linux, linux-image-3.5.0-25-omap, linux-image-3.5.0-25-powerpc-smp, linux-image-3.5.0-25-highbank, linux-image-3.5.0-25-powerpc64-smp