In order to fix the issues, users just have to upgrade the operating system

Mar 20, 2013 12:41 GMT  ·  By

Canonical published details in a security notice about a pam-xdg-support vulnerability, for its Ubuntu 12.10 (Raring Ringtail) operating system.

According to Canonical, lpam-xdg-support could have been made to run programs, as an administrator.

It was discovered that pam-xdg-support incorrectly handled the PATH environment variable. A local attacker could have used this exploit, in Ubuntu 12.10 (Raring Ringtail), in combination with the sudo application, to possibly escalate privileges for the current user.

The security flaw can be fixed if you upgrade your system(s) to the latest libpam-xdg-support package, specific to each operating system. To apply the update, run the Update Manager application.

In general, a standard system update will make all the necessary changes. A system restart won't be necessary to implement the changes.

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.