vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-0728): Linux kernel vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jan 19, 2016
Added
Feb 7, 2016
Modified
Apr 14, 2025

Description

Yevgeny Pats discovered that the session keyring implementation in the
Linux kernel did not properly reference count when joining an existing
session keyring. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code with
administrative privileges.

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-76-genericubuntu-upgrade-linux-image-3-13-0-76-generic-lpaeubuntu-upgrade-linux-image-3-13-0-76-lowlatencyubuntu-upgrade-linux-image-3-13-0-76-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-76-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-76-powerpc-smpubuntu-upgrade-linux-image-3-13-0-76-powerpc64-embubuntu-upgrade-linux-image-3-13-0-76-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-59-genericubuntu-upgrade-linux-image-3-16-0-59-generic-lpaeubuntu-upgrade-linux-image-3-16-0-59-lowlatencyubuntu-upgrade-linux-image-3-16-0-59-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-59-powerpc-smpubuntu-upgrade-linux-image-3-16-0-59-powerpc64-embubuntu-upgrade-linux-image-3-16-0-59-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-47-genericubuntu-upgrade-linux-image-3-19-0-47-generic-lpaeubuntu-upgrade-linux-image-3-19-0-47-lowlatencyubuntu-upgrade-linux-image-3-19-0-47-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-47-powerpc-smpubuntu-upgrade-linux-image-3-19-0-47-powerpc64-embubuntu-upgrade-linux-image-3-19-0-47-powerpc64-smpubuntu-upgrade-linux-image-4-2-0-1020-raspi2ubuntu-upgrade-linux-image-4-2-0-25-genericubuntu-upgrade-linux-image-4-2-0-25-generic-lpaeubuntu-upgrade-linux-image-4-2-0-25-lowlatencyubuntu-upgrade-linux-image-4-2-0-25-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-25-powerpc-smpubuntu-upgrade-linux-image-4-2-0-25-powerpc64-embubuntu-upgrade-linux-image-4-2-0-25-powerpc64-smp
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.