First published: Thu Oct 20 2016(Updated: )
It was discovered that a race condition existed in the memory manager of the Linux kernel when handling copy-on-write breakage of private read-only memory mappings. A local attacker could use this to gain administrative privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-1032-snapdragon | <4.4.0-1032.36 | 4.4.0-1032.36 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3106-4 is considered high due to the potential for local attackers to gain administrative privileges.
To fix USN-3106-4, update your Linux kernel to version 4.4.0-1032.36 or later.
USN-3106-4 affects Ubuntu 16.04 with the linux-image-4.4.0-1032-snapdragon package.
The vulnerability USN-3106-4 was discovered internally and is related to a race condition in the memory manager of the Linux kernel.
No, USN-3106-4 requires local access to the system for exploitation.