USN-3107-1: Linux kernel vulnerability
USN-3107-1: Linux kernel vulnerability Ubuntu Security Notice USN-3107-1 19th October, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details It was discovered that a race condition existed in the memory manager ofthe Linux kernel when handling copy-on-write breakage of private read-onlymemory mappings. A local attacker could use this to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.10: linux-image-4.8.0-26-powerpc64-emb 4.8.0-26.28 linux-image-4.8.0-26-generic 4.8.0-26.28 linux-image-4.8.0-26-generic-lpae 4.8.0-26.28 linux-image-4.8.0-26-lowlatency 4.8.0-26.28 linux-image-4.8.0-26-powerpc-smp 4.8.0-26.28 linux-image-4.8.0-26-powerpc-e500mc 4.8.0-26.28 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the [ more… ]