vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-3070): Linux kernel vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
2016-07-14
Added
2016-07-14
Modified
2025-04-14

Description

Jan Stancek discovered that the Linux kernel's memory manager did not
properly handle moving pages mapped by the asynchronous I/O (AIO) ring
buffer to the other nodes. A local attacker could use this to cause a
denial of service (system crash).

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-92-genericubuntu-upgrade-linux-image-3-13-0-92-generic-lpaeubuntu-upgrade-linux-image-3-13-0-92-lowlatencyubuntu-upgrade-linux-image-3-13-0-92-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-92-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-92-powerpc-smpubuntu-upgrade-linux-image-3-13-0-92-powerpc64-embubuntu-upgrade-linux-image-3-13-0-92-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-77-genericubuntu-upgrade-linux-image-3-16-0-77-generic-lpaeubuntu-upgrade-linux-image-3-16-0-77-lowlatencyubuntu-upgrade-linux-image-3-16-0-77-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-77-powerpc-smpubuntu-upgrade-linux-image-3-16-0-77-powerpc64-embubuntu-upgrade-linux-image-3-16-0-77-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-65-genericubuntu-upgrade-linux-image-3-19-0-65-generic-lpaeubuntu-upgrade-linux-image-3-19-0-65-lowlatencyubuntu-upgrade-linux-image-3-19-0-65-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-65-powerpc-smpubuntu-upgrade-linux-image-3-19-0-65-powerpc64-embubuntu-upgrade-linux-image-3-19-0-65-powerpc64-smpubuntu-upgrade-linux-image-4-2-0-1034-raspi2ubuntu-upgrade-linux-image-4-2-0-42-genericubuntu-upgrade-linux-image-4-2-0-42-generic-lpaeubuntu-upgrade-linux-image-4-2-0-42-lowlatencyubuntu-upgrade-linux-image-4-2-0-42-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-42-powerpc-smpubuntu-upgrade-linux-image-4-2-0-42-powerpc64-embubuntu-upgrade-linux-image-4-2-0-42-powerpc64-smp
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.