Privilege escalation vulnerability in power policy functions
Bug #1340812 reported by
Jonathan Davies
This bug affects 2 people
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| acpi-support (Ubuntu) |
Fix Released
|
High
|
Marc Deslauriers | ||
| Precise |
Fix Released
|
High
|
Marc Deslauriers | ||
| Saucy |
Fix Released
|
High
|
Marc Deslauriers | ||
| Trusty |
Fix Released
|
High
|
Marc Deslauriers | ||
| Utopic |
Fix Released
|
High
|
Marc Deslauriers | ||
Bug Description
The Advanced Configuration and Power Interface daemon (acpid) bundled with Ubuntu is vulnerable to a race condition that allows a local user to gain root privileges.
Related branches
CVE References
| summary: |
- User to root vulnerability in power policy functions + Privilege escalation vulnerability in power policy functions |
| information type: | Private Security → Public Security |
| Changed in acpi-support (Ubuntu Saucy): | |
| status: | Invalid → Fix Released |
| Changed in acpi-support (Ubuntu Trusty): | |
| status: | Invalid → Fix Released |
| Changed in acpi-support (Ubuntu Utopic): | |
| status: | Invalid → Fix Released |
To post a comment you must log in.

This is CVE-2014-1419