** Description changed: - A race conditon in ptrace can lead to kernel stack corruption and - arbitrary kernel-mode code execution. + Race condition in the ptrace functionality in the Linux kernel before + 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace + system call in a crafted application, as demonstrated by ptrace_death. Break-Fix: - 910ffdb18a6408e14febbb6e4b6840fd2c928c82 Break-Fix: - 9899d11f654474d2d54ea52ceaa2a1f4db3abd68 Break-Fix: - 9067ac85d533651b98c2ff903182a20cbb361fcb
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1129192 Title: CVE-2013-0871 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1129192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs