First published: Thu Oct 13 2016(Updated: )
A race condition was found in the way Linux kernel's memory subsystem handled breakage of the read only private mappings COW situation on write access. An unprivileged local user could use this flaw to gain write access to otherwise read only memory mappings and thus increase their privileges on the system. Red Hat is aware of this issue and if you have questions about the affectedness of your system please contact Red Hat Support. For additional information see <a href="https://access.redhat.com/security/vulnerabilities/2706661">https://access.redhat.com/security/vulnerabilities/2706661</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1384344 is classified as high due to the potential for unprivileged users to escalate their privileges.
To fix REDHAT-BUG-1384344, you need to update your kernel to the latest version provided by Red Hat that addresses this vulnerability.
Not addressing REDHAT-BUG-1384344 could lead to unprivileged users gaining unauthorized write access to read-only memory mappings, compromising system integrity.
REDHAT-BUG-1384344 affects systems running specific versions of the Red Hat Linux kernel where this vulnerability exists.
No, REDHAT-BUG-1384344 is not a remote vulnerability; it requires local access for exploitation.