Upstream information

CVE-2015-3290 at MITRE

Description

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Note from the SUSE Security Team

This issue only affects Linux Kernels with ESPFIX and 16bit segments enabled, and nested NMI sources. SUSE Linux Enterprise Server 12 does not enable ESPFIX or 16bit segments, so it is not affected. SUSE Linux Enterprise 11 and older have no sources of nested NMIs, so can not be exploited. Only openSUSE 13.2 and openSUSE Tumbleweed (201508) are affected.

SUSE Bugzilla entries: 937969 [RESOLVED / FIXED], 937970 [RESOLVED], 938706 [RESOLVED / FIXED], 939207 [RESOLVED / FIXED], 939269 [RESOLVED]

SUSE Security Advisories:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE Linux Enterprise Desktop 11 SP3 kernel-source Affected
SUSE Linux Enterprise Desktop 11 SP4 kernel-source Affected
SUSE Linux Enterprise Server 11 SP3 kernel-source Affected
SUSE Linux Enterprise Server 11 SP4 kernel-source Affected
SUSE Linux Enterprise Server for VMWare 11 SP3 kernel-source Affected