The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
https://bugzilla.redhat.com/show_bug.cgi?id=1308846
https://security-tracker.debian.org/tracker/CVE-2016-3070
https://github.com/torvalds/linux/commit/42cb14b110a5698ccf26ce59c4441722605a3743
http://www.ubuntu.com/usn/USN-3036-1
http://www.ubuntu.com/usn/USN-3035-1
http://www.debian.org/security/2016/dsa-3607
http://www.ubuntu.com/usn/USN-3035-3
http://www.ubuntu.com/usn/USN-3035-2
http://www.ubuntu.com/usn/USN-3034-2
http://www.ubuntu.com/usn/USN-3037-1
http://www.securityfocus.com/bid/90518
http://www.ubuntu.com/usn/USN-3034-1
Source: MITRE
Published: 2016-08-06
Updated: 2023-02-12
Type: CWE-476
Base Score: 4.6
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.9
Severity: MEDIUM
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH