From the description of this CVE[1]:
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64
platform improperly relies on espfix64 during nested NMI processing, which
allows local users to gain privileges by triggering an NMI within a certain
instruction window.
From the description of this CVE[1]: entry/entry_ 64.S in the Linux kernel before 4.1.6 on the x86_64
arch/x86/
platform improperly relies on espfix64 during nested NMI processing, which
allows local users to gain privileges by triggering an NMI within a certain
instruction window.
It looks like this is x86_64 specific.