arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
15 Feb 2024, 18:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html - Third Party Advisory, VDB Entry | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html - Third Party Advisory, VDB Entry | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html - Third Party Advisory, VDB Entry | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html - Third Party Advisory, VDB Entry | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html - Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0185.html - Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0212.html - Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0224.html - Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0715.html - Third Party Advisory, VDB Entry | |
References | () http://www.debian.org/security/2015/dsa-3313 - Third Party Advisory, VDB Entry | |
References | () http://www.openwall.com/lists/oss-security/2015/07/22/7 - Mailing List | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/76005 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2687-1 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2688-1 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2689-1 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2690-1 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2691-1 - Third Party Advisory, VDB Entry | |
References | () https://github.com/torvalds/linux/commit/9b6e6a8334d56354853f9c255d1395c2ba570e0a - Third Party Advisory |
12 Feb 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI. |
02 Feb 2023, 16:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A flaw was found in the way the Linux kernel handled IRET faults during the processing of NMIs. An unprivileged, local user could use this flaw to crash the system or, potentially (although highly unlikely), escalate their privileges on the system. |
Information
Published : 2015-08-31 10:59
Updated : 2024-03-14 19:58
NVD link : CVE-2015-5157
Mitre link : CVE-2015-5157
CVE.ORG link : CVE-2015-5157
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_hpc_node
linux
- linux_kernel
CWE
CWE-264
Permissions, Privileges, and Access Controls