CVE-2015-5307
Published Nov 16, 2015
Last updated 2 years ago
Overview
- Description
- The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F1B9081-FA4D-426C-B2DE-78AEA0BB6DB1", "versionEndIncluding": "4.2.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF948E6A-07BE-4C7D-8A98-002E89D35F4D" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0E23B94-1726-4F63-84BB-8D83FAB156D7" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C76124AB-4E3D-4BE0-AAEA-7FC05868E2FB" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F30B5EF5-0AE8-420B-A103-B1B25A372F09" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F784EF07-DBEC-492A-A0F4-F9F7B2551A0B" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1044792C-D544-457C-9391-4F3B5BAB978D" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBD9AD01-50B7-4951-8A73-A6CF4801A487" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89AA8FD5-E997-4F0D-AFB6-FFBE0073BA5D" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75615D84-9CA1-456C-816D-768E37B074A4" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB87384-A1F8-4136-A242-441C655D9364" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90CCECD0-C0F9-45A8-8699-64428637EBCA" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0ED340C-6746-471E-9F2D-19D62D224B7A" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99BD7C4F-DE4C-4508-B20D-46A94B616C5B" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3374F1FB-70F9-4EBC-837B-0D42282E3E5F" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37DA3D28-EAE7-4EC9-977C-444A46CBD9C7" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B6F7CE9-C409-4D88-9A99-B21420633F45" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B814C381-4991-495A-B530-7543F977B346" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FE1F484-23B4-4CCC-AD23-6F8BDC312CE8" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14442705-D243-4250-A486-E70989946D73" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBB7BAFE-9CB4-40D2-908C-55307728116F" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AD42E21-EA9E-41EB-AC7E-478CCEEEBA8D" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9D58EAB-3FEB-4D5A-B998-D77EC90FDFB8" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A480976-A583-4A03-A2C6-5F35F9C27D70", "versionEndIncluding": "4.0.34", "versionStartIncluding": "4.0.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1F3632E-CE76-4C29-8F43-383EB819C008", "versionEndIncluding": "4.1.42", "versionStartIncluding": "4.1.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "431E3B20-2ED2-42A8-93E2-F8404CB5D434", "versionEndIncluding": "4.2.34", "versionStartIncluding": "4.2.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E9D0C13-3D1C-45CB-B051-5C0221EF716A", "versionEndIncluding": "4.3.29", "versionStartIncluding": "4.3.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "380841F1-CF6C-44E1-BE8E-6615BC3FB5B0", "versionEndIncluding": "5.0.8", "versionStartIncluding": "5.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA" }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355" } ], "operator": "OR" } ] } ]