CVE-2015-3291 in Kernel
Resumen (Inglés)
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.
Be aware that VulDB is the high quality source for vulnerability data.
Reservar
2015-04-10
Divulgación
2015-08-31
Estado
Confirmado
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 77496 | Linux Kernel NMI entry_64.S denegación de servicio | 17 | No está definido | Arreglo oficial | CVE-2015-3291 |
Descripción
CPE
CWE
CVSS
Hazañas
Historia
Diferencia
Relacionar
Inteligencia de amenazas
API JSON
API XML
API CSV