[USN-3106-2] Linux kernel (Xenial HWE) vulnerability

Severity High
Affected Packages 8
CVEs 1

The system could be made to run programs as an administrator.

USN-3106-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

It was discovered that a race condition existed in the memory manager of
the Linux kernel when handling copy-on-write breakage of private read-only
memory mappings. A local attacker could use this to gain administrative
privileges.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-extra-4.4.0-45-generic?distro=trusty ubuntu linux-image-extra-4.4.0-45-generic < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-powerpc64-smp?distro=trusty ubuntu linux-image-4.4.0-45-powerpc64-smp < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-powerpc64-emb?distro=trusty ubuntu linux-image-4.4.0-45-powerpc64-emb < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-powerpc-smp?distro=trusty ubuntu linux-image-4.4.0-45-powerpc-smp < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-powerpc-e500mc?distro=trusty ubuntu linux-image-4.4.0-45-powerpc-e500mc < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-lowlatency?distro=trusty ubuntu linux-image-4.4.0-45-lowlatency < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-generic?distro=trusty ubuntu linux-image-4.4.0-45-generic < 4.4.0-45.66~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-45-generic-lpae?distro=trusty ubuntu linux-image-4.4.0-45-generic-lpae < 4.4.0-45.66~14.04.1 trusty
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...