vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-3070): Linux kernel vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 14, 2016
Added
Jul 14, 2016
Modified
Aug 18, 2025

Description

Jan Stancek discovered that the Linux kernel's memory manager did not
properly handle moving pages mapped by the asynchronous I/O (AIO) ring
buffer to the other nodes. A local attacker could use this to cause a
denial of service (system crash).

Solutions

ubuntu-upgrade-linux-image-3-13-0-92-genericubuntu-upgrade-linux-image-3-13-0-92-generic-lpaeubuntu-upgrade-linux-image-3-13-0-92-lowlatencyubuntu-upgrade-linux-image-3-13-0-92-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-92-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-92-powerpc-smpubuntu-upgrade-linux-image-3-13-0-92-powerpc64-embubuntu-upgrade-linux-image-3-13-0-92-powerpc64-smpubuntu-upgrade-linux-image-3-16-0-77-genericubuntu-upgrade-linux-image-3-16-0-77-generic-lpaeubuntu-upgrade-linux-image-3-16-0-77-lowlatencyubuntu-upgrade-linux-image-3-16-0-77-powerpc-e500mcubuntu-upgrade-linux-image-3-16-0-77-powerpc-smpubuntu-upgrade-linux-image-3-16-0-77-powerpc64-embubuntu-upgrade-linux-image-3-16-0-77-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-65-genericubuntu-upgrade-linux-image-3-19-0-65-generic-lpaeubuntu-upgrade-linux-image-3-19-0-65-lowlatencyubuntu-upgrade-linux-image-3-19-0-65-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-65-powerpc-smpubuntu-upgrade-linux-image-3-19-0-65-powerpc64-embubuntu-upgrade-linux-image-3-19-0-65-powerpc64-smpubuntu-upgrade-linux-image-4-2-0-1034-raspi2ubuntu-upgrade-linux-image-4-2-0-42-genericubuntu-upgrade-linux-image-4-2-0-42-generic-lpaeubuntu-upgrade-linux-image-4-2-0-42-lowlatencyubuntu-upgrade-linux-image-4-2-0-42-powerpc-e500mcubuntu-upgrade-linux-image-4-2-0-42-powerpc-smpubuntu-upgrade-linux-image-4-2-0-42-powerpc64-embubuntu-upgrade-linux-image-4-2-0-42-powerpc64-smp

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.