[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-3291Date: (C)2015-09-03   (M)2024-04-19


arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.1
Exploit Score: 3.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
BID-76003
DSA-3313
USN-2687-1
USN-2688-1
USN-2689-1
USN-2690-1
USN-2691-1
http://www.openwall.com/lists/oss-security/2015/07/22/7
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
https://bugzilla.redhat.com/show_bug.cgi?id=1243489
https://github.com/torvalds/linux/commit/810bc075f78ff2c221536eb3008eac6a492dba2d

CPE    1
cpe:/o:linux:linux_kernel
CWE    1
CWE-17
OVAL    17
oval:org.secpod.oval:def:109416
oval:org.secpod.oval:def:109451
oval:org.secpod.oval:def:109421
oval:org.secpod.oval:def:702684
...

© SecPod Technologies