6.3 Medium
AI Score
Confidence
Low
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
27.9%
USN-319-1 fixed a Linux kernel vulnerability in Ubuntu 6.06 LTS. This
followup advisory provides the corresponding updates for Ubuntu 5.04
and 5.10.
For reference, these are the details of the original USN:
A race condition has been discovered in the file permission handling
of the /proc file system. A local attacker could exploit this to
execute arbitrary code with full root privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-powerpc-smp | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-patch-ubuntu-2.6.12 | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-hppa32 | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-itanium-smp | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-sparc64 | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-powerpc64-smp | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-hppa64-smp | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-amd64-generic | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-iseries-smp | < 2.6.12-10.36 | UNKNOWN |
Ubuntu | 5.10 | noarch | linux-image-2.6.12-10-k7-smp | < 2.6.12-10.36 | UNKNOWN |