The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
12 Feb 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c. |
02 Feb 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) is handled. A privileged user inside a guest could use this flaw to create denial of service conditions on the host kernel. |
Information
Published : 2015-11-16 11:59
Updated : 2023-12-10 11:46
NVD link : CVE-2015-5307
Mitre link : CVE-2015-5307
CVE.ORG link : CVE-2015-5307
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
xen
- xen
canonical
- ubuntu_linux
oracle
- vm_virtualbox
CWE
CWE-399
Resource Management Errors