First published: Wed May 06 2015(Updated: )
Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3.13-rc4-next-20131218 allows local users to cause a denial of service (ldsem_down_read and ldsem_down_write deadlock) by establishing a new tty thread during shutdown of a previous tty thread.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=3.13.3 | |
Red Hat Enterprise Linux Compute Node EUS | =7.1 | |
redhat enterprise Linux for ibm z systems eus | =7.1_s390x | |
redhat enterprise Linux for power big endian eus | =7.1_ppc64 | |
redhat enterprise Linux for power little endian eus | =7.1_ppc64le | |
redhat enterprise Linux server eus | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4170 has a medium severity rating due to its capability to cause a denial of service.
To mitigate CVE-2015-4170, it is recommended to update the Linux kernel to version 3.13.4 or later.
CVE-2015-4170 affects Linux kernel versions prior to 3.13.4.
CVE-2015-4170 exploits a race condition during the shutdown of tty threads.
Yes, local users can exploit CVE-2015-4170 to create a denial of service condition.