vulnerability

Red Hat: CVE-2016-2143: Important: kernel security and bug fix update ((Multiple Advisories))

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
2016-04-27
Added
2016-08-02
Modified
2018-06-21

Description

The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.

Solution(s)

redhat-upgrade-kernelredhat-upgrade-kernel-abi-whitelistsredhat-upgrade-kernel-bootwrapperredhat-upgrade-kernel-debugredhat-upgrade-kernel-debug-debuginforedhat-upgrade-kernel-debug-develredhat-upgrade-kernel-debuginforedhat-upgrade-kernel-debuginfo-common-i686redhat-upgrade-kernel-debuginfo-common-ppc64redhat-upgrade-kernel-debuginfo-common-s390xredhat-upgrade-kernel-debuginfo-common-x86_64redhat-upgrade-kernel-develredhat-upgrade-kernel-docredhat-upgrade-kernel-firmwareredhat-upgrade-kernel-headersredhat-upgrade-kernel-kdumpredhat-upgrade-kernel-kdump-debuginforedhat-upgrade-kernel-kdump-develredhat-upgrade-kernel-toolsredhat-upgrade-kernel-tools-debuginforedhat-upgrade-kernel-tools-libsredhat-upgrade-kernel-tools-libs-develredhat-upgrade-perfredhat-upgrade-perf-debuginforedhat-upgrade-python-perfredhat-upgrade-python-perf-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.