vulnerability

Red Hat: CVE-2016-2143: Important: kernel security and bug fix update ((Multiple Advisories))

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Apr 27, 2016
Added
Aug 2, 2016
Modified
Jun 21, 2018

Description

The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.

Solutions

redhat-upgrade-kernelredhat-upgrade-kernel-abi-whitelistsredhat-upgrade-kernel-bootwrapperredhat-upgrade-kernel-debugredhat-upgrade-kernel-debug-debuginforedhat-upgrade-kernel-debug-develredhat-upgrade-kernel-debuginforedhat-upgrade-kernel-debuginfo-common-i686redhat-upgrade-kernel-debuginfo-common-ppc64redhat-upgrade-kernel-debuginfo-common-s390xredhat-upgrade-kernel-debuginfo-common-x86_64redhat-upgrade-kernel-develredhat-upgrade-kernel-docredhat-upgrade-kernel-firmwareredhat-upgrade-kernel-headersredhat-upgrade-kernel-kdumpredhat-upgrade-kernel-kdump-debuginforedhat-upgrade-kernel-kdump-develredhat-upgrade-kernel-toolsredhat-upgrade-kernel-tools-debuginforedhat-upgrade-kernel-tools-libsredhat-upgrade-kernel-tools-libs-develredhat-upgrade-perfredhat-upgrade-perf-debuginforedhat-upgrade-python-perfredhat-upgrade-python-perf-debuginfo

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.