First published: Mon Nov 02 2015(Updated: )
It was found that a guest can DoS a host by triggering an infinite loop in microcode. If a guest in 32-bit mode enabled alignment exceptions, puts the exception handler in ring 3, and then triggers an alignment exception with an unaligned stack, then the microcode will enter an infinite loop. Because there's no instruction boundary the core never receives another interrupt (including SMIs). The host kernel panics pretty quickly due to the effects. A privileged user inside guest could use this flaw to crash the host kernel resulting in DoS. Upstream KVM patch: ------------------- -> <a href="http://permalink.gmane.org/gmane.linux.kernel/2082329">http://permalink.gmane.org/gmane.linux.kernel/2082329</a> References: ----------- -> <a href="http://www.openwall.com/lists/oss-security/2015/11/10/1">http://www.openwall.com/lists/oss-security/2015/11/10/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-573.12.1.el6 | 0:2.6.32-573.12.1.el6 |
redhat/kernel | <0:2.6.32-220.65.1.el6 | 0:2.6.32-220.65.1.el6 |
redhat/kernel | <0:2.6.32-358.69.1.el6 | 0:2.6.32-358.69.1.el6 |
redhat/kernel | <0:2.6.32-431.68.1.el6 | 0:2.6.32-431.68.1.el6 |
redhat/kernel | <0:2.6.32-504.40.1.el6 | 0:2.6.32-504.40.1.el6 |
redhat/kernel | <0:3.10.0-327.3.1.el7 | 0:3.10.0-327.3.1.el7 |
redhat/kernel | <0:3.10.0-229.24.2.el7 | 0:3.10.0-229.24.2.el7 |
Linux Linux kernel | <=4.2.3 | |
Xen Xen | =4.3.0 | |
Xen Xen | =4.3.1 | |
Xen Xen | =4.3.2 | |
Xen Xen | =4.3.3 | |
Xen Xen | =4.3.4 | |
Xen Xen | =4.4.0 | |
Xen Xen | =4.4.1 | |
Xen Xen | =4.4.2 | |
Xen Xen | =4.4.3 | |
Xen Xen | =4.4.4 | |
Xen Xen | =4.5.0 | |
Xen Xen | =4.5.1 | |
Xen Xen | =4.5.2 | |
Xen Xen | =4.5.3 | |
Xen Xen | =4.5.5 | |
Xen Xen | =4.6.0 | |
Xen Xen | =4.6.1 | |
Xen Xen | =4.6.2 | |
Xen Xen | =4.6.3 | |
Xen Xen | =4.6.4 | |
Xen Xen | =4.6.5 | |
Xen Xen | =4.6.6 | |
Oracle VM VirtualBox | >=4.0.0<=4.0.34 | |
Oracle VM VirtualBox | >=4.1.0<=4.1.42 | |
Oracle VM VirtualBox | >=4.2.0<=4.2.34 | |
Oracle VM VirtualBox | >=4.3.0<=4.3.29 | |
Oracle VM VirtualBox | >=5.0.0<=5.0.8 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)