Unrated severityNVD Advisory· Published May 27, 2015· Updated May 6, 2026
CVE-2015-2666
CVE-2015-2666
Description
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
Affected products
19- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- osv-coords17 versionspkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/kgraft-patch-SLE12_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012
< 3.12.43-52.6.1+ 16 more
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.2
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.2
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 3.12.43-52.6.1
- (no CPE)range: < 1-2.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/torvalds/linux/commit/f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4nvdPatch
- lists.fedoraproject.org/pipermail/package-announce/2015-March/153329.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1534.htmlnvdThird Party Advisory
- www.securitytracker.com/id/1032414nvdThird Party AdvisoryVDB Entry
- git.kernel.orgnvdBroken Link
- www.openwall.com/lists/oss-security/2015/03/20/18nvdMailing List
- bugzilla.redhat.com/show_bug.cginvdIssue Tracking
News mentions
0No linked articles in our index yet.