vulnerability
Red Hat: CVE-2015-8844: Important: kernel-rt security, bug fix, and enhancement update ((Multiple Advisories))
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:M/Au:N/C:N/I:N/A:C) | Apr 27, 2016 | Nov 4, 2016 | Jun 21, 2018 |
Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:N/A:C)
Published
Apr 27, 2016
Added
Nov 4, 2016
Modified
Jun 21, 2018
Description
The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for an MSR with both the S and T bits set, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
Solutions
redhat-upgrade-kernelredhat-upgrade-kernel-abi-whitelistsredhat-upgrade-kernel-bootwrapperredhat-upgrade-kernel-debugredhat-upgrade-kernel-debug-debuginforedhat-upgrade-kernel-debug-develredhat-upgrade-kernel-debuginforedhat-upgrade-kernel-debuginfo-common-ppc64redhat-upgrade-kernel-debuginfo-common-s390xredhat-upgrade-kernel-debuginfo-common-x86_64redhat-upgrade-kernel-develredhat-upgrade-kernel-docredhat-upgrade-kernel-headersredhat-upgrade-kernel-kdumpredhat-upgrade-kernel-kdump-debuginforedhat-upgrade-kernel-kdump-develredhat-upgrade-kernel-rtredhat-upgrade-kernel-rt-debugredhat-upgrade-kernel-rt-debug-debuginforedhat-upgrade-kernel-rt-debug-develredhat-upgrade-kernel-rt-debuginforedhat-upgrade-kernel-rt-debuginfo-common-x86_64redhat-upgrade-kernel-rt-develredhat-upgrade-kernel-rt-docredhat-upgrade-kernel-rt-traceredhat-upgrade-kernel-rt-trace-debuginforedhat-upgrade-kernel-rt-trace-develredhat-upgrade-kernel-toolsredhat-upgrade-kernel-tools-debuginforedhat-upgrade-kernel-tools-libsredhat-upgrade-kernel-tools-libs-develredhat-upgrade-perfredhat-upgrade-perf-debuginforedhat-upgrade-python-perfredhat-upgrade-python-perf-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.