First published: Wed Apr 27 2016(Updated: )
The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.218-1 5.10.221-1 6.1.94-1 6.1.99-1 6.9.12-1 6.10.3-1 | |
Linux Kernel | >=2.6.25<3.2.79 | |
Linux Kernel | >=3.3<3.12.58 | |
Linux Kernel | >=3.13<3.16.35 | |
Linux Kernel | >=3.17<4.1.21 | |
Linux Kernel | >=4.2<4.4.6 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Red Hat Enterprise Linux | =7.0 | |
Oracle Linux | =7-0 | |
Linux Kernel | =4.4-rc8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2143 is classified as a high severity vulnerability due to its potential to cause a system crash.
To remediate CVE-2016-2143, upgrade to a kernel version that is equal to or greater than 4.5.
CVE-2016-2143 primarily affects local users on s390 platforms running vulnerable versions of the Linux kernel.
CVE-2016-2143 can lead to a denial of service, resulting in system crashes for those affected.
CVE-2016-2143 affects Linux kernel versions below 4.5.