Your submission was sent successfully! Close

USN-319-1: Linux kernel vulnerability

18 July 2006

Linux kernel vulnerability

Releases

Details

A race condition has been discovered in the file permission handling
of the /proc file system. A local attacker could exploit this to
execute arbitrary code with full root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06
  • linux-image-2.6.15-26-hppa32-smp - 2.6.15-26.45
  • linux-image-2.6.15-26-powerpc64-smp - 2.6.15-26.45
  • linux-image-2.6.15-26-hppa64 - 2.6.15-26.45
  • linux-image-2.6.15-26-386 - 2.6.15-26.45
  • linux-image-2.6.15-26-amd64-xeon - 2.6.15-26.45
  • linux-image-2.6.15-26-amd64-server - 2.6.15-26.45
  • linux-image-2.6.15-26-amd64-k8 - 2.6.15-26.45
  • linux-image-2.6.15-26-hppa64-smp - 2.6.15-26.45
  • linux-image-2.6.15-26-k7 - 2.6.15-26.45
  • linux-image-2.6.15-26-server-bigiron - 2.6.15-26.45
  • linux-image-2.6.15-26-powerpc - 2.6.15-26.45
  • linux-image-2.6.15-26-mckinley-smp - 2.6.15-26.45
  • linux-image-2.6.15-26-amd64-generic - 2.6.15-26.45
  • linux-image-2.6.15-26-server - 2.6.15-26.45
  • linux-image-2.6.15-26-mckinley - 2.6.15-26.45
  • linux-image-2.6.15-26-itanium-smp - 2.6.15-26.45
  • linux-image-2.6.15-26-hppa32 - 2.6.15-26.45
  • linux-image-2.6.15-26-686 - 2.6.15-26.45
  • linux-image-2.6.15-26-itanium - 2.6.15-26.45
  • linux-image-2.6.15-26-powerpc-smp - 2.6.15-26.45
  • linux-image-2.6.15-26-sparc64 - 2.6.15-26.45
  • linux-image-2.6.15-26-sparc64-smp - 2.6.15-26.45

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

This flaw affects Ubuntu 5.04 and Ubuntu 5.10 as well; these releases
will be fixed shortly in a followup advisory.

References

Related notices

  • USN-319-2: linux-image-2.6.12-10-powerpc64-smp, linux-image-2.6.12-10-amd64-xeon, linux-image-2.6.12-10-amd64-k8, linux-image-2.6.10-6-sparc64, linux-image-2.6.10-6-hppa64-smp, linux-image-2.6.12-10-powerpc, linux-image-2.6.10-6-hppa32, linux-image-2.6.12-10-386, linux-image-2.6.12-10-686, linux-image-2.6.12-10-amd64-generic, linux-image-2.6.10-6-power3, linux-image-2.6.10-6-power4, linux-image-2.6.10-6-itanium, linux-image-2.6.12-10-iseries-smp, linux-image-2.6.12-10-686-smp, linux-image-2.6.10-6-k7-smp, linux-image-2.6.12-10-hppa32-smp, linux-image-2.6.12-10-hppa64, linux-image-2.6.10-6-mckinley-smp, linux-image-2.6.12-10-powerpc-smp, linux-image-2.6.12-10-itanium-smp, linux-image-2.6.10-6-k7, linux-image-2.6.10-6-amd64-k8, linux-image-2.6.12-10-itanium, linux-image-2.6.12-10-sparc64, linux-image-2.6.10-6-powerpc, linux-image-2.6.12-10-hppa64-smp, linux-image-2.6.10-6-hppa64, linux-image-2.6.10-6-power3-smp, linux-image-2.6.10-6-386, linux-image-2.6.10-6-686-smp, linux-image-2.6.12-10-k7-smp, linux-image-2.6.12-10-amd64-k8-smp, linux-image-2.6.10-6-powerpc-smp, linux-image-2.6.12-10-hppa32, linux-image-2.6.10-6-itanium-smp, linux-image-2.6.12-10-sparc64-smp, linux-image-2.6.10-6-amd64-generic, linux-image-2.6.10-6-686, linux-image-2.6.10-6-hppa32-smp, linux-image-2.6.10-6-sparc64-smp, linux-image-2.6.12-10-k7, linux-image-2.6.10-6-amd64-xeon, linux-image-2.6.12-10-mckinley-smp, linux-patch-ubuntu-2.6.10, linux-image-2.6.10-6-mckinley, linux-image-2.6.10-6-power4-smp, linux-image-2.6.12-10-mckinley, linux-patch-ubuntu-2.6.12, linux-image-2.6.10-6-amd64-k8-smp