First published: Tue Jan 26 2016(Updated: )
A flaw was discovered in a way the Linux deals with paging structures. When Linux invalidates a paging structure that is not in use locally, it could, in principle, race against another CPU that is switching to a process that uses the paging structure in question. External reference: <a href="http://seclists.org/oss-sec/2016/q1/194">http://seclists.org/oss-sec/2016/q1/194</a> Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71b3c126e61177eb693423f2e18a1914205b165e">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71b3c126e61177eb693423f2e18a1914205b165e</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q1/210">http://seclists.org/oss-sec/2016/q1/210</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Linux Linux kernel | <=4.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2069 is a vulnerability in the Linux kernel that allows local users to gain privileges through a race condition in the arch/x86/mm/tlb.c file.
CVE-2016-2069 has a severity rating of medium.
The affected versions include Linux kernel versions before 4.4.1, 3.2.0-102.142, 3.13.0-87.133, 4.5~, and 4.2.0-30.35.
To fix CVE-2016-2069, update your Linux kernel to version 4.4.1 or newer.
You can find more information about CVE-2016-2069 in the references provided: http://www.openwall.com/lists/oss-security/2016/01/25/1, http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71b3c126e61177eb693423f2e18a1914205b165e, http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1.