First published: Tue Nov 24 2015(Updated: )
arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <4.4 | |
Linux Linux kernel | =4.4 | |
Linux Linux kernel | =4.4-rc1 | |
Linux Linux kernel | =4.4-rc2 | |
Linux Linux kernel | =4.4-rc3 | |
Linux Linux kernel | =4.4-rc4 | |
Linux Linux kernel | =4.4-rc5 | |
Linux Linux kernel | =4.4-rc6 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =22 | |
Fedoraproject Fedora | =23 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
Canonical Ubuntu Linux | =15.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2015-7513.
CVE-2015-7513 has a severity level of medium (4).
CVE-2015-7513 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value.
The Linux kernel versions before 4.4 are affected by CVE-2015-7513.
Yes, updating to Linux kernel version 4.4~ or later can mitigate CVE-2015-7513.