First published: Thu Oct 20 2016(Updated: )
It was discovered that a race condition existed in the memory manager of the Linux kernel when handling copy-on-write breakage of private read-only memory mappings. A local attacker could use this to gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-45-generic | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-45-generic-lpae | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-45-lowlatency | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-45-powerpc-e500mc | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-45-powerpc-smp | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-45-powerpc64-emb | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-45-powerpc64-smp | <4.4.0-45.66 | 4.4.0-45.66 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3106-1 is classified as a high severity vulnerability due to the potential for a local attacker to gain administrative privileges.
To mitigate USN-3106-1, you should update to the Linux kernel version 4.4.0-45.66 or later.
USN-3106-1 affects Ubuntu 16.04 systems using specific versions of the Linux kernel.
USN-3106-1 is a race condition vulnerability related to the memory manager in the Linux kernel.
USN-3106-1 requires local access to the system for exploitation, making it less of a remote threat.