This bug was fixed in the package linux - 3.8.0-19.30
--------------- linux (3.8.0-19.30) raring-proposed; urgency=low
[ Upstream Kernel Changes ]
* Add file_ns_capable() helper function for open-time capability checking (CVE-2013-1959) - LP: #1174590 - CVE-2013-1959 * userns: Don't let unprivileged users trick privileged users into setting the id_map (CVE-2013-1959) - LP: #1174590 - CVE-2013-1959 * userns: Check uid_map's opener's fsuid, not the current fsuid (CVE-2013-1959) - LP: #1174590 - CVE-2013-1959 * net: fix incorrect credentials passing (CVE-2013-1979) - LP: #1174827 - CVE-2013-1979 * userns: Changing any namespace id mappings should require privileges (CVE-2013-1979) - LP: #1174827 - CVE-2013-1979 -- Tim Gardner <email address hidden> Thu, 18 Apr 2013 11:21:24 -0400
This bug was fixed in the package linux - 3.8.0-19.30
---------------
linux (3.8.0-19.30) raring-proposed; urgency=low
[ Upstream Kernel Changes ]
* Add file_ns_capable() helper function for open-time capability checking
(CVE-2013-1959)
- LP: #1174590
- CVE-2013-1959
* userns: Don't let unprivileged users trick privileged users into
setting the id_map (CVE-2013-1959)
- LP: #1174590
- CVE-2013-1959
* userns: Check uid_map's opener's fsuid, not the current fsuid
(CVE-2013-1959)
- LP: #1174590
- CVE-2013-1959
* net: fix incorrect credentials passing (CVE-2013-1979)
- LP: #1174827
- CVE-2013-1979
* userns: Changing any namespace id mappings should require privileges
(CVE-2013-1979)
- LP: #1174827
- CVE-2013-1979
-- Tim Gardner <email address hidden> Thu, 18 Apr 2013 11:21:24 -0400