CVE-2015-5157
Redhat Enterprise Linux Desktop < 3.12.47 - Access Control
Title source: ruleDescription
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
References (22)
Core 22
Core References
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-0212.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
Third Party Advisory x_refsource_confirm
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-0715.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2689-1
Third Party Advisory x_refsource_confirm
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2690-1
Mailing List, Third Party Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/76005
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2691-1
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2688-1
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-0185.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3313
Vendor Advisory x_refsource_confirm
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/07/22/7
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-0224.html
Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/9b6e6a8334d56354853f9c255d1395c2ba570e0a
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2687-1
Scores
EPSS
0.0022
EPSS Percentile
44.3%
Details
CWE
CWE-264
Status
published
Products (6)
linux/linux_kernel
< 3.12.47
redhat/enterprise_linux_desktop
6.0
redhat/enterprise_linux_hpc_node
6.0
redhat/enterprise_linux_server
6.0
redhat/enterprise_linux_server_eus
6.7.z
redhat/enterprise_linux_workstation
6.0
Published
Aug 31, 2015
Tracked Since
Feb 18, 2026