vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-5195): Linux kernel vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 24, 2016
Added
Oct 24, 2016
Modified
Apr 14, 2025

Description

It was discovered that a race condition existed in the memory manager of
the Linux kernel when handling copy-on-write breakage of private read-only
memory mappings. A local attacker could use this to gain administrative
privileges.

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-100-genericubuntu-upgrade-linux-image-3-13-0-100-generic-lpaeubuntu-upgrade-linux-image-3-13-0-100-lowlatencyubuntu-upgrade-linux-image-3-13-0-100-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-100-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-100-powerpc-smpubuntu-upgrade-linux-image-3-13-0-100-powerpc64-embubuntu-upgrade-linux-image-3-13-0-100-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-113-genericubuntu-upgrade-linux-image-3-2-0-113-generic-paeubuntu-upgrade-linux-image-3-2-0-113-highbankubuntu-upgrade-linux-image-3-2-0-113-omapubuntu-upgrade-linux-image-3-2-0-113-powerpc-smpubuntu-upgrade-linux-image-3-2-0-113-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-113-virtualubuntu-upgrade-linux-image-3-2-0-1491-omap4ubuntu-upgrade-linux-image-4-4-0-1029-raspi2ubuntu-upgrade-linux-image-4-4-0-1032-snapdragonubuntu-upgrade-linux-image-4-4-0-45-genericubuntu-upgrade-linux-image-4-4-0-45-generic-lpaeubuntu-upgrade-linux-image-4-4-0-45-lowlatencyubuntu-upgrade-linux-image-4-4-0-45-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-45-powerpc-smpubuntu-upgrade-linux-image-4-4-0-45-powerpc64-embubuntu-upgrade-linux-image-4-4-0-45-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1017-raspi2ubuntu-upgrade-linux-image-4-8-0-26-genericubuntu-upgrade-linux-image-4-8-0-26-generic-lpaeubuntu-upgrade-linux-image-4-8-0-26-lowlatencyubuntu-upgrade-linux-image-4-8-0-26-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-26-powerpc-smpubuntu-upgrade-linux-image-4-8-0-26-powerpc64-emb
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.