First published: Thu May 16 2013(Updated: )
An flaw was discovered in the Linux kernel's perf_events interface. A local user could exploit this flaw to escalate privileges on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.5.0-30-omap | <3.5.0-30.51 | 3.5.0-30.51 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-30-generic | <3.5.0-30.51 | 3.5.0-30.51 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-30-highbank | <3.5.0-30.51 | 3.5.0-30.51 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-30-powerpc-smp | <3.5.0-30.51 | 3.5.0-30.51 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 | |
All of | ||
ubuntu/linux-image-3.5.0-30-powerpc64-smp | <3.5.0-30.51 | 3.5.0-30.51 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-1826-1 is classified as a privilege escalation vulnerability in the Linux kernel.
To fix USN-1826-1, users should upgrade the affected Ubuntu packages to version 3.5.0-30.51.
USN-1826-1 affects Ubuntu version 12.10 with specific Linux kernel packages listed in the advisory.
No, USN-1826-1 is a local vulnerability that requires local user access to exploit.
The vulnerability in USN-1826-1 is rooted in the Linux kernel's perf_events interface, allowing for potential privilege escalation.