Descriptionarch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
Overall state of this security issue: Pending
This issue is currently rated as having important severity.
|National Vulnerability Database|
Note from the SUSE Security TeamThis issue only affects Linux Kernels with ESPFIX and 16bit segments enabled, and nested NMI sources. SUSE Linux Enterprise Server 12 does not enable ESPFIX or 16bit segments, so it is not affected. SUSE Linux Enterprise 11 and older have no sources of nested NMIs, so can not be exploited. Only openSUSE 13.2 and openSUSE Tumbleweed (201508) are affected. SUSE Bugzilla entries: 937969 [RESOLVED / FIXED], 937970 [RESOLVED], 938706 [RESOLVED / FIXED], 939207 [RESOLVED / FIXED], 939269 [RESOLVED] SUSE Security Advisories:
- openSUSE-SU-2015:1382-1, published Fri, 14 Aug 2015 11:09:20 +0200 (CEST)
- openSUSE-SU-2015:1842-1, published Thu, 29 Oct 2015 17:52:39 +0100 (CET)
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Desktop 11 SP3||kernel-source||Affected|
|SUSE Linux Enterprise Desktop 11 SP4||kernel-source||Affected|
|SUSE Linux Enterprise Server 11 SP3||kernel-source||Affected|
|SUSE Linux Enterprise Server 11 SP4||kernel-source||Affected|
|SUSE Linux Enterprise Server for VMWare 11 SP3||kernel-source||Affected|