** Description changed: - Malicious user code can cause some fraction of NMIs to be ignored. + arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 + platform does not properly determine when nested NMI processing is + occurring, which allows local users to cause a denial of service + (skipped NMI) by modifying the rsp register, issuing a syscall + instruction, and triggering an NMI. Break-Fix: 3f3c8b8c4b2a34776c3470142a7c8baafcda6eb0 810bc075f78ff2c221536eb3008eac6a492dba2d
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1478819 Title: CVE-2015-3291 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1478819/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
