CVE-2015-8104

The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d Patch Issue Tracking Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2636.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-2645.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0046.html Third Party Advisory
http://support.citrix.com/article/CTX202583 Third Party Advisory
http://support.citrix.com/article/CTX203879 Third Party Advisory
http://www.debian.org/security/2015/dsa-3414 Third Party Advisory
http://www.debian.org/security/2015/dsa-3426 Third Party Advisory
http://www.debian.org/security/2016/dsa-3454 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/11/10/5 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/10/10/4
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.securityfocus.com/bid/77524 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/91787 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034105 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2840-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2841-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2841-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2842-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2842-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2843-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2843-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-2844-1 Third Party Advisory
http://xenbits.xen.org/xsa/advisory-156.html Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1278496 Issue Tracking Vendor Advisory
https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d Patch Issue Tracking Vendor Advisory
https://kb.juniper.net/JSA10783 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

10 Oct 2023, 15:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2023/10/10/4 -
References (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d - Issue Tracking, Patch, Vendor Advisory (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d - Patch, Issue Tracking, Vendor Advisory
References (CONFIRM) https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d - Issue Tracking, Patch, Vendor Advisory (CONFIRM) https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d - Patch, Issue Tracking, Vendor Advisory

Information

Published : 2015-11-16 11:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-8104

Mitre link : CVE-2015-8104

CVE.ORG link : CVE-2015-8104


JSON object : View

Products Affected

canonical

  • ubuntu_linux

xen

  • xen

oracle

  • vm_virtualbox
  • solaris

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors