Ubuntu 12.04 LTS : linux-lts-trusty vulnerability (USN-2597-2)

Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

USN-2597-1 fixed vulnerabilities in the Linux kernel, however an
unrelated regression in the auditing of some path names was
introduced. Due to the regression the system could crash under certain
conditions.

This update fixes the problem.

We apologize for the inconvenience.

A race condition between chown() and execve() was discovered in the
Linux kernel. A local attacker could exploit this race by using chown
on a setuid-user-binary to gain administrative privileges.

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected linux-image-3.13-generic and / or
linux-image-3.13-generic-lpae packages.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 83331 ()

Bugtraq ID: 74243

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now