First published: Fri Feb 22 2013(Updated: )
Suleiman Souhlal, Salman Qazi, Aaron Durbin and Michael Davidson discovered a race condition in the Linux kernel's ptrace syscall. An unprivileged local attacker could exploit this flaw to run programs as an administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-31-powerpc-smp | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-generic | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-virtual | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-generic-pae | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-omap | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-powerpc64-smp | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-server | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-31-powerpc | <3.0.0-31.49 | 3.0.0-31.49 |
=11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.