[USN-3104-1] Linux kernel vulnerability
Severity
High
CVEs
1
The system could be made to run programs as an administrator.
It was discovered that a race condition existed in the memory manager of
the Linux kernel when handling copy-on-write breakage of private read-only
memory mappings. A local attacker could use this to gain administrative
privileges.
- ID
- USN-3104-1
- Severity
- high
- Severity from
- CVE-2016-5195
- URL
- https://ubuntu.com/security/notices/USN-3104-1
- Published
-
2016-10-20T01:46:48
(8 years ago) - Modified
-
2016-10-20T01:46:48
(8 years ago) - Other Advisories
-
- ALAS-2016-757
- ASA-201610-11
- ASA-201610-14
- CISA-2022:0303
- CISCO-SA-20161026-LINUX
- DSA-3696-1
- ELSA-2016-2098
- ELSA-2016-2105
- ELSA-2016-2124
- ELSA-2016-3632
- ELSA-2016-3633
- ELSA-2016-3634
- FEDORA-2016-c3558808cd
- FEDORA-2016-c8a0c7eece
- FEDORA-2016-db4b75b352
- openSUSE-SU-2020:0554-1
- RHSA-2016:2098
- RHSA-2016:2105
- RHSA-2016:2110
- RHSA-2017:0372
- SSA:2016-305-01
- SUSE-SU-2016:2585-1
- SUSE-SU-2016:2592-1
- SUSE-SU-2016:2593-1
- SUSE-SU-2016:2596-1
- SUSE-SU-2016:2614-1
- SUSE-SU-2016:2629-1
- SUSE-SU-2016:2630-1
- SUSE-SU-2016:2631-1
- SUSE-SU-2016:2632-1
- SUSE-SU-2016:2633-1
- SUSE-SU-2016:2634-1
- SUSE-SU-2016:2635-1
- SUSE-SU-2016:2636-1
- SUSE-SU-2016:2637-1
- SUSE-SU-2016:2638-1
- SUSE-SU-2016:2655-1
- SUSE-SU-2016:2657-1
- SUSE-SU-2016:2658-1
- SUSE-SU-2016:2659-1
- SUSE-SU-2016:2673-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2016:3304-1
- USN-3104-2
- USN-3105-1
- USN-3105-2
- USN-3106-1
- USN-3106-2
- USN-3106-3
- USN-3106-4
- USN-3107-1
- USN-3107-2
- VU:243144
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |