{"id":"CVE-2015-5307","details":"The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.","modified":"2026-02-04T14:41:10.846405Z","published":"2015-11-16T11:59:05Z","related":["MGASA-2015-0450","MGASA-2016-0014","MGASA-2016-0015","MGASA-2016-0098","MGASA-2016-0225","MGASA-2016-0232","MGASA-2016-0233","SUSE-SU-2015:2108-1","SUSE-SU-2015:2194-1","SUSE-SU-2015:2306-1","SUSE-SU-2015:2324-1","SUSE-SU-2015:2326-1","SUSE-SU-2015:2328-1","SUSE-SU-2015:2338-1","SUSE-SU-2015:2339-1","SUSE-SU-2015:2350-1","SUSE-SU-2016:0354-1","SUSE-SU-2016:2074-1","openSUSE-SU-2024:10196-1"],"references":[{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2636.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2645.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0046.html"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX202583"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3396"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3414"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3454"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/11/10/6"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/77528"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034105"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2800-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2801-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2802-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2803-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2804-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2805-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2806-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2807-1"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-156.html"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277172"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed"},{"type":"ADVISORY","url":"https://kb.juniper.net/JSA10783"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/11/10/6"},{"type":"FIX","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277172"}],"schema_version":"1.7.3"}