CVE-2015-5307

Severity

49%

Complexity

39%

Confidentiality

115%

The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

CVSS 2.0 Base Score 4.9. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:N/I:N/A:C).

Overview

First reported 9 years ago

2015-11-16 11:59:00

Last updated 6 years ago

2019-02-12 19:04:00

Affected Software

Linux Kernel

Xen Xen 4.3.0

4.3.0

Xen 4.3.1

4.3.1

Xen Xen 4.3.2

4.3.2

Xen Xen 4.3.3

4.3.3

Xen 4.3.4

4.3.4

Xen Xen 4.4.0

4.4.0

Xen Xen 4.4.1

4.4.1

Xen Xen 4.4.2

4.4.2

Xen Xen 4.4.3

4.4.3

Xen 4.4.4

4.4.4

Xen Xen 4.5.0

4.5.0

Xen Xen 4.5.1

4.5.1

Xen Xen 4.5.2

4.5.2

Xen 4.5.3

4.5.3

Xen 4.5.5

4.5.5

Xen Xen 4.6.0

4.6.0

Xen Xen 4.6.1

4.6.1

Xen 4.6.2

4.6.2

Xen 4.6.3

4.6.3

Xen 4.6.4

4.6.4

Xen 4.6.5

4.6.5

Xen 4.6.6

4.6.6

Debian Linux 7.0

7.0

Debian Linux 8.0 (Jessie)

8.0

Canonical Ubuntu Linux 12.04 LTS

12.04

Canonical Ubuntu Linux 14.04 LTS (Long-Term Support)

14.04

Canonical Ubuntu Linux 15.10

15.10

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed

Vendor Advisory

FEDORA-2015-f150b2a8c8

Mailing List, Third Party Advisory

FEDORA-2015-668d213dc3

Mailing List, Third Party Advisory

FEDORA-2015-394835a3f6

Mailing List, Third Party Advisory

SUSE-SU-2015:2108

Mailing List, Third Party Advisory

SUSE-SU-2015:2194

Mailing List, Third Party Advisory

SUSE-SU-2015:2339

Mailing List, Third Party Advisory

SUSE-SU-2015:2350

Mailing List, Third Party Advisory

SUSE-SU-2016:0354

Mailing List, Third Party Advisory

SUSE-SU-2016:2074

Mailing List, Third Party Advisory

openSUSE-SU-2015:2232

Mailing List, Third Party Advisory

openSUSE-SU-2015:2250

Mailing List, Third Party Advisory

RHSA-2015:2636

Third Party Advisory

RHSA-2015:2645

Third Party Advisory

RHSA-2016:0046

Third Party Advisory

http://support.citrix.com/article/CTX202583

Third Party Advisory

DSA-3396

Third Party Advisory

DSA-3414

Third Party Advisory

DSA-3454

Third Party Advisory

[oss-security] 20151110 Re: CVE-2015-5307 kernel: kvm: guest to host DoS by triggering an infinite loop in microcode via #AC exception

Mailing List, Third Party Advisory

http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Patch, Vendor Advisory

http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Vendor Advisory

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Vendor Advisory

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Vendor Advisory

77528

Third Party Advisory, VDB Entry

1034105

Third Party Advisory, VDB Entry

USN-2800-1

Third Party Advisory

USN-2801-1

Third Party Advisory

USN-2802-1

Third Party Advisory

USN-2803-1

Third Party Advisory

USN-2804-1

Third Party Advisory

USN-2805-1

Third Party Advisory

USN-2806-1

Third Party Advisory

USN-2807-1

Third Party Advisory

http://xenbits.xen.org/xsa/advisory-156.html

Vendor Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=1277172

Issue Tracking, Third Party Advisory

https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed

Vendor Advisory

https://kb.juniper.net/JSA10783

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.