First published: Wed May 04 2016(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
Linux Kernel | <=4.6 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Software Development Kit | =12.0-sp1 | |
SUSE Linux Enterprise Debuginfo | =11.0-sp4 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Desktop | =12.0-sp1 | |
SUSE Linux Enterprise Live Patching | =12.0 | |
SUSE Linux Enterprise Module for Public Cloud | =12.0 | |
SUSE Linux Enterprise Real Time Extension | =12.0-sp1 | |
SUSE Linux Enterprise Server | =11.0-extra | |
SUSE Linux Enterprise Server | =11.0-sp4 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Server | =12.0-sp1 | |
SUSE Linux Enterprise Workstation Extension | =12.0 | |
SUSE Linux Enterprise Workstation Extension | =12.0-sp1 | |
Fedoraproject Fedora | =24 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-4482 is considered to be medium due to its potential to expose sensitive information from the kernel stack.
To fix CVE-2016-4482, update to a patched version of the Linux kernel, specifically version 5.10.223-1 or higher.
CVE-2016-4482 affects Linux kernel versions up to and including 4.6 as well as several Ubuntu and SUSE Linux distributions.
CVE-2016-4482 is a local privilege escalation vulnerability that allows unauthorized access to sensitive kernel memory.
CVE-2016-4482 cannot be exploited remotely as it requires local access to the machine.