vulnerability
CentOS: (CVE-2016-4565) (Multiple Advisories): kernel
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | May 23, 2016 | Jul 22, 2016 | May 3, 2019 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
May 23, 2016
Added
Jul 22, 2016
Modified
May 3, 2019
Description
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
Solution(s)
centos-upgrade-kernelcentos-upgrade-kernel-abi-whitelistscentos-upgrade-kernel-debugcentos-upgrade-kernel-debug-develcentos-upgrade-kernel-develcentos-upgrade-kernel-doccentos-upgrade-kernel-firmwarecentos-upgrade-kernel-headerscentos-upgrade-kernel-toolscentos-upgrade-kernel-tools-libscentos-upgrade-kernel-tools-libs-develcentos-upgrade-perfcentos-upgrade-python-perf
References
- SUSE-SUSE-SU-2016:1672
- SUSE-SUSE-SU-2016:1690
- SUSE-SUSE-SU-2016:1937
- SUSE-SUSE-SU-2016:1961
- SUSE-SUSE-SU-2016:1985
- SUSE-SUSE-SU-2016:1994
- SUSE-SUSE-SU-2016:1995
- SUSE-SUSE-SU-2016:2000
- SUSE-SUSE-SU-2016:2001
- SUSE-SUSE-SU-2016:2002
- SUSE-SUSE-SU-2016:2003
- SUSE-SUSE-SU-2016:2005
- SUSE-SUSE-SU-2016:2006
- SUSE-SUSE-SU-2016:2007
- SUSE-SUSE-SU-2016:2009
- SUSE-SUSE-SU-2016:2010
- SUSE-SUSE-SU-2016:2011
- SUSE-SUSE-SU-2016:2014
- SUSE-SUSE-SU-2016:2105
- REDHAT-RHSA-2016:1277
- REDHAT-RHSA-2016:1301
- REDHAT-RHSA-2016:1341
- REDHAT-RHSA-2016:1406
- REDHAT-RHSA-2016:1489
- REDHAT-RHSA-2016:1581
- REDHAT-RHSA-2016:1617
- REDHAT-RHSA-2016:1640
- REDHAT-RHSA-2016:1657
- REDHAT-RHSA-2016:1814
- DEBIAN-DLA-516-1
- DEBIAN-DSA-3607
- BID-90301
- UBUNTU-USN-3001-1
- UBUNTU-USN-3002-1
- UBUNTU-USN-3003-1
- UBUNTU-USN-3004-1
- UBUNTU-USN-3005-1
- UBUNTU-USN-3006-1
- UBUNTU-USN-3007-1
- UBUNTU-USN-3018-1
- UBUNTU-USN-3018-2
- UBUNTU-USN-3019-1
- UBUNTU-USN-3021-1
- UBUNTU-USN-3021-2
- NVD-CVE-2016-4565

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.