First published: Wed Jul 15 2015(Updated: )
A flaw was found in the way Linux kernel's nested NMI handler and espfix64 functionalities interacted during NMI processing. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Upstream fix: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a</a> Acknowledgements: Red Hat would like to thank Andy Lutomirski for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.12.47 | |
Linux Kernel | >=3.13<3.14.54 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.22 | |
Linux Kernel | >=3.19<4.1.6 | |
Linux Kernel | <=4.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3290 has a moderate severity, allowing a local, unprivileged user to crash the system or potentially escalate privileges.
To fix CVE-2015-3290, update the Linux kernel to versions above 4.1.5, or apply the relevant patches from the upstream maintainers.
CVE-2015-3290 affects Linux kernel versions prior to 3.12.47 and multiple versions between 3.13 and 4.1.5.
CVE-2015-3290 cannot be exploited remotely as it requires local, unprivileged access to the system.
The potential impacts of CVE-2015-3290 include system crashes and unauthorized privilege escalation for local users.