First published: Wed Jul 15 2015(Updated: )
It was found that if an NMI occurred immediately after a SYSCALL or before a SYSRET with the user RSP pointing to the NMI IST stack, the kernel could skip that NMI. Upstream fix: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d</a> Acknowledgements: Red Hat would like to thank Andy Lutomirski for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1243489 has been rated as a medium severity vulnerability due to potential impacts on system stability.
To fix REDHAT-BUG-1243489, ensure you apply the recommended kernel patches provided by Red Hat.
REDHAT-BUG-1243489 affects the Red Hat Linux Kernel in various distributions using vulnerable versions.
Not addressing REDHAT-BUG-1243489 can lead to system instability and potential denial of service under specific conditions.
Yes, REDHAT-BUG-1243489 has been documented publicly in the Red Hat Bugzilla database.