Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-3291

Опубликовано: 31 авг. 2015
Источник: nvd
CVSS2: 2.1
EPSS Низкий

Описание

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия до 4.1.5 (включая)

EPSS

Процентиль: 19%
0.0006
Низкий

2.1 Low

CVSS2

Дефекты

CWE-17

Связанные уязвимости

ubuntu
больше 10 лет назад

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.

redhat
больше 10 лет назад

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.

debian
больше 10 лет назад

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_ ...

github
больше 3 лет назад

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.

EPSS

Процентиль: 19%
0.0006
Низкий

2.1 Low

CVSS2

Дефекты

CWE-17