First published: Thu Oct 20 2016(Updated: )
It was discovered that a race condition existed in the memory manager of the Linux kernel when handling copy-on-write breakage of private read-only memory mappings. A local attacker could use this to gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-1029-raspi2 | <4.4.0-1029.36 | 4.4.0-1029.36 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3106-3 addresses a critical vulnerability that allows local attackers to gain administrative privileges.
To fix USN-3106-3, update the affected package to linux-image-4.4.0-1029.36 or higher.
USN-3106-3 affects Ubuntu 16.04 systems running the linux-image-4.4.0-1029-raspi2 package.
There is no specific workaround for USN-3106-3; applying the official patch is recommended.
USN-3106-3 is classified as a race condition vulnerability within the memory management of the Linux kernel.