vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-3070): Linux kernel vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 14, 2016
Added
Jul 14, 2016
Modified
Apr 14, 2025

Description

Jan Stancek discovered that the Linux kernel's memory manager did not
properly handle moving pages mapped by the asynchronous I/O (AIO) ring
buffer to the other nodes. A local attacker could use this to cause a
denial of service (system crash).

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-92-genericubuntu-upgrade-linux-image-3-13-0-92-generic-lpaeubuntu-upgrade-linux-image-3-13-0-92-lowlatencyubuntu-upgrade-linux-image-3-13-0-92-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-92-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-92-powerpc-smpubuntu-upgrade-linux-image-3-13-0-92-powerpc64-embubuntu-upgrade-linux-image-3-13-0-92-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-77-genericubuntu-upgrade-linux-image-3-16-0-77-generic-lpaeubuntu-upgrade-linux-image-3-16-0-77-lowlatencyubuntu-upgrade-linux-image-3-16-0-77-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-77-powerpc-smpubuntu-upgrade-linux-image-3-16-0-77-powerpc64-embubuntu-upgrade-linux-image-3-16-0-77-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-65-genericubuntu-upgrade-linux-image-3-19-0-65-generic-lpaeubuntu-upgrade-linux-image-3-19-0-65-lowlatencyubuntu-upgrade-linux-image-3-19-0-65-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-65-powerpc-smpubuntu-upgrade-linux-image-3-19-0-65-powerpc64-embubuntu-upgrade-linux-image-3-19-0-65-powerpc64-smpubuntu-upgrade-linux-image-4-2-0-1034-raspi2ubuntu-upgrade-linux-image-4-2-0-42-genericubuntu-upgrade-linux-image-4-2-0-42-generic-lpaeubuntu-upgrade-linux-image-4-2-0-42-lowlatencyubuntu-upgrade-linux-image-4-2-0-42-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-42-powerpc-smpubuntu-upgrade-linux-image-4-2-0-42-powerpc64-embubuntu-upgrade-linux-image-4-2-0-42-powerpc64-smp
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.