vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-0728): Linux kernel vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jan 19, 2016
Added
Feb 7, 2016
Modified
Apr 14, 2025

Description

Yevgeny Pats discovered that the session keyring implementation in the
Linux kernel did not properly reference count when joining an existing
session keyring. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code with
administrative privileges.

Solutions

ubuntu-upgrade-linux-image-3-13-0-76-genericubuntu-upgrade-linux-image-3-13-0-76-generic-lpaeubuntu-upgrade-linux-image-3-13-0-76-lowlatencyubuntu-upgrade-linux-image-3-13-0-76-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-76-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-76-powerpc-smpubuntu-upgrade-linux-image-3-13-0-76-powerpc64-embubuntu-upgrade-linux-image-3-13-0-76-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-59-genericubuntu-upgrade-linux-image-3-16-0-59-generic-lpaeubuntu-upgrade-linux-image-3-16-0-59-lowlatencyubuntu-upgrade-linux-image-3-16-0-59-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-59-powerpc-smpubuntu-upgrade-linux-image-3-16-0-59-powerpc64-embubuntu-upgrade-linux-image-3-16-0-59-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-47-genericubuntu-upgrade-linux-image-3-19-0-47-generic-lpaeubuntu-upgrade-linux-image-3-19-0-47-lowlatencyubuntu-upgrade-linux-image-3-19-0-47-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-47-powerpc-smpubuntu-upgrade-linux-image-3-19-0-47-powerpc64-embubuntu-upgrade-linux-image-3-19-0-47-powerpc64-smpubuntu-upgrade-linux-image-4-2-0-1020-raspi2ubuntu-upgrade-linux-image-4-2-0-25-genericubuntu-upgrade-linux-image-4-2-0-25-generic-lpaeubuntu-upgrade-linux-image-4-2-0-25-lowlatencyubuntu-upgrade-linux-image-4-2-0-25-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-25-powerpc-smpubuntu-upgrade-linux-image-4-2-0-25-powerpc64-embubuntu-upgrade-linux-image-4-2-0-25-powerpc64-smp

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.