5.5
CVSSv3

CVE-2015-8845

Published: 27/04/2016 Updated: 05/01/2018
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel prior to 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

novell suse linux enterprise desktop 12.0

novell suse linux enterprise server 12.0

suse suse linux enterprise software development kit 12.0

suse suse linux enterprise module for public cloud 12.0

suse suse linux enterprise workstation extension 12.0

suse suse linux enterprise real time extension 12

suse suse linux enterprise live patching 12.0

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
A flaw was found in the Linux kernel which could cause a kernel panic when restoring machine specific registers on the PowerPC platform Incorrect transactional memory state registers could inadvertently change the call path on return from userspace and cause the kernel to enter an unknown state and crash ...