Privilege escalation vulnerability in power policy functions
Bug #1340812 reported by
Jonathan Davies
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
acpi-support (Ubuntu) |
Fix Released
|
High
|
Marc Deslauriers | ||
Precise |
Fix Released
|
High
|
Marc Deslauriers | ||
Saucy |
Fix Released
|
High
|
Marc Deslauriers | ||
Trusty |
Fix Released
|
High
|
Marc Deslauriers | ||
Utopic |
Fix Released
|
High
|
Marc Deslauriers |
Bug Description
The Advanced Configuration and Power Interface daemon (acpid) bundled with Ubuntu is vulnerable to a race condition that allows a local user to gain root privileges.
Related branches
CVE References
summary: |
- User to root vulnerability in power policy functions + Privilege escalation vulnerability in power policy functions |
information type: | Private Security → Public Security |
Changed in acpi-support (Ubuntu Saucy): | |
status: | Invalid → Fix Released |
Changed in acpi-support (Ubuntu Trusty): | |
status: | Invalid → Fix Released |
Changed in acpi-support (Ubuntu Utopic): | |
status: | Invalid → Fix Released |
To post a comment you must log in.
This is CVE-2014-1419