First published: Wed Apr 01 2015(Updated: )
A flaw was found in the way the Linux kernel's 32-bit emulation implementation handled forking or closing of a task with an 'int80' entry. A local user could potentially use this flaw to escalate their privileges on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-504.30.3.el6 | 0:2.6.32-504.30.3.el6 |
redhat/kernel-rt | <0:3.10.0-229.7.2.rt56.141.6.el7_1 | 0:3.10.0-229.7.2.rt56.141.6.el7_1 |
redhat/kernel | <0:3.10.0-229.7.2.ael7b | 0:3.10.0-229.7.2.ael7b |
redhat/kernel-rt | <1:3.10.0-229.rt56.153.el6 | 1:3.10.0-229.rt56.153.el6 |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Linux Kernel | <=3.19.1 | |
Ubuntu | =12.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2015-2830 has a medium severity rating due to the potential for local privilege escalation.
To fix CVE-2015-2830, upgrade to the patched versions of the kernel as provided by your Linux distribution.
CVE-2015-2830 affects Linux kernel versions prior to 3.19.2.
CVE-2015-2830 impacts various Linux distributions including Red Hat, Debian, and Ubuntu.
CVE-2015-2830 cannot be exploited remotely, as it requires local user access to the system.