=========================================================== Ubuntu Security Notice USN-985-1 September 08, 2010 mountall vulnerability CVE-2010-2961 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 10.04 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 10.04 LTS: mountall 2.15.2 In general, a standard system update will make all the necessary changes. Details follow: Alasdair MacGregor discovered that mountall created a udev rule file with world-writable permissions. A local attacker could exploit this under certain conditions to cause udev to execute arbitrary commands as the root user. Updated packages for Ubuntu 10.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/m/mountall/mountall_2.15.2.dsc Size/MD5: 972 92e488f0e51ab3c20ddf537fdc92fd24 http://security.ubuntu.com/ubuntu/pool/main/m/mountall/mountall_2.15.2.tar.gz Size/MD5: 564582 036e6a108a9bc0c2155a7226ad5437c3 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/m/mountall/mountall_2.15.2_amd64.deb Size/MD5: 56016 76dc051afb8a20077f0c0b709369d6c0 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/m/mountall/mountall_2.15.2_i386.deb Size/MD5: 52384 42ebb3fa3f81ed1a08270d48a8f6b367 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/m/mountall/mountall_2.15.2_powerpc.deb Size/MD5: 55780 cf51c1268b9b188150f9d2131882d8bb sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/m/mountall/mountall_2.15.2_sparc.deb Size/MD5: 56758 276c85acaf4feaa54c53615f0a572b8b