The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2636.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2645.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0046.html Third Party Advisory
http://support.citrix.com/article/CTX202583 Third Party Advisory
http://www.debian.org/security/2015/dsa-3396 Third Party Advisory
http://www.debian.org/security/2015/dsa-3414 Third Party Advisory
http://www.debian.org/security/2016/dsa-3454 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/11/10/6 Mailing List Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Patch Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Vendor Advisory
http://www.securityfocus.com/bid/77528 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034105 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2800-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2801-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2802-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2803-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2804-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2805-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2806-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2807-1 Third Party Advisory
http://xenbits.xen.org/xsa/advisory-156.html Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1277172 Issue Tracking Third Party Advisory
https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed Vendor Advisory
https://kb.juniper.net/JSA10783 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2015-11-16T11:00:00

Updated: 2017-05-23T01:57:01

Reserved: 2015-07-01T00:00:00


Link: CVE-2015-5307

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2015-11-16T11:59:05.070

Modified: 2023-02-12T23:15:35.367


Link: CVE-2015-5307

JSON object: View

cve-icon Redhat Information

No data.

CWE