Executive Summary

Informations
Name CVE-2015-3291 First vendor Publication 2015-08-31
Vendor Cve Last vendor Modification 2016-12-22

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-17 Code

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 2286

Nessus® Vulnerability Scanner

Date Description
2015-08-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3329.nasl - Type : ACT_GATHER_INFO
2015-08-06 Name : The remote Fedora host is missing a security update.
File : fedora_2015-12437.nasl - Type : ACT_GATHER_INFO
2015-07-31 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2700-1.nasl - Type : ACT_GATHER_INFO
2015-07-31 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2701-1.nasl - Type : ACT_GATHER_INFO
2015-07-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2687-1.nasl - Type : ACT_GATHER_INFO
2015-07-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2688-1.nasl - Type : ACT_GATHER_INFO
2015-07-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2689-1.nasl - Type : ACT_GATHER_INFO
2015-07-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2690-1.nasl - Type : ACT_GATHER_INFO
2015-07-29 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2691-1.nasl - Type : ACT_GATHER_INFO
2015-07-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3313.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/76003
CONFIRM http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810...
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
https://bugzilla.redhat.com/show_bug.cgi?id=1243489
https://github.com/torvalds/linux/commit/810bc075f78ff2c221536eb3008eac6a492d...
DEBIAN http://www.debian.org/security/2015/dsa-3313
MLIST http://www.openwall.com/lists/oss-security/2015/07/22/7
UBUNTU http://www.ubuntu.com/usn/USN-2687-1
http://www.ubuntu.com/usn/USN-2688-1
http://www.ubuntu.com/usn/USN-2689-1
http://www.ubuntu.com/usn/USN-2690-1
http://www.ubuntu.com/usn/USN-2691-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
Date Informations
2024-03-12 12:29:17
  • Multiple Updates
2024-02-02 01:31:59
  • Multiple Updates
2024-02-01 12:09:20
  • Multiple Updates
2023-12-29 01:28:14
  • Multiple Updates
2023-11-22 01:27:58
  • Multiple Updates
2023-09-05 12:30:24
  • Multiple Updates
2023-09-05 01:09:12
  • Multiple Updates
2023-09-02 12:30:22
  • Multiple Updates
2023-09-02 01:09:22
  • Multiple Updates
2023-08-12 12:33:07
  • Multiple Updates
2023-08-12 01:08:50
  • Multiple Updates
2023-08-11 12:28:25
  • Multiple Updates
2023-08-11 01:09:05
  • Multiple Updates
2023-08-06 12:27:36
  • Multiple Updates
2023-08-06 01:08:49
  • Multiple Updates
2023-08-04 12:27:42
  • Multiple Updates
2023-08-04 01:08:53
  • Multiple Updates
2023-07-14 12:27:42
  • Multiple Updates
2023-07-14 01:08:51
  • Multiple Updates
2023-03-29 01:29:25
  • Multiple Updates
2023-03-28 12:09:11
  • Multiple Updates
2022-10-11 12:24:56
  • Multiple Updates
2022-10-11 01:08:59
  • Multiple Updates
2022-09-09 01:22:02
  • Multiple Updates
2022-03-11 01:20:32
  • Multiple Updates
2021-05-25 12:16:33
  • Multiple Updates
2021-05-04 12:39:37
  • Multiple Updates
2021-04-22 01:48:29
  • Multiple Updates
2020-08-11 12:12:43
  • Multiple Updates
2020-08-08 01:12:42
  • Multiple Updates
2020-08-07 12:12:53
  • Multiple Updates
2020-08-07 01:13:26
  • Multiple Updates
2020-08-01 12:12:41
  • Multiple Updates
2020-07-30 01:13:16
  • Multiple Updates
2020-05-23 01:55:36
  • Multiple Updates
2020-05-23 00:45:09
  • Multiple Updates
2019-01-25 12:07:08
  • Multiple Updates
2018-11-17 12:05:41
  • Multiple Updates
2018-11-07 12:03:44
  • Multiple Updates
2018-10-30 12:07:49
  • Multiple Updates
2018-08-09 12:03:43
  • Multiple Updates
2018-04-25 12:06:31
  • Multiple Updates
2017-08-26 12:02:37
  • Multiple Updates
2017-05-13 12:01:26
  • Multiple Updates
2017-03-22 12:01:33
  • Multiple Updates
2017-01-13 12:01:28
  • Multiple Updates
2016-12-22 09:23:58
  • Multiple Updates
2016-11-29 00:25:11
  • Multiple Updates
2016-08-12 12:02:10
  • Multiple Updates
2016-07-13 12:01:27
  • Multiple Updates
2016-06-30 21:41:21
  • Multiple Updates
2016-06-29 00:56:34
  • Multiple Updates
2016-04-27 02:20:53
  • Multiple Updates
2015-08-31 21:29:35
  • Multiple Updates
2015-08-31 17:36:01
  • First insertion