First published: Mon Aug 31 2015(Updated: )
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise Linux desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server eus | =6.7.z | |
redhat enterprise Linux workstation | =6.0 | |
Linux Kernel | <=4.1.5 | |
Linux Kernel | <3.12.47 | |
Linux Kernel | >=3.13<3.14.54 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.18.22 | |
Linux Kernel | >=3.19<4.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5157 is classified as a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2015-5157, users should upgrade to a version of the Linux kernel that is later than 4.1.6 or apply the relevant patches provided by their Linux distribution.
CVE-2015-5157 affects various Red Hat Enterprise Linux versions, including Enterprise Linux Desktop, HPC Node, Server, and Workstation, as well as specific versions of the Linux kernel.
No, CVE-2015-5157 requires local access to the system for exploitation, as it relies on triggering non-maskable interrupts (NMIs) during userspace execution.
Currently, there are no recommended workarounds for CVE-2015-5157 other than upgrading the kernel to a secure version.