The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2015-8104 - Medium Severity Vulnerability
Vulnerable Library - linuxlinux-4.6
The Linux Kernel
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux
Found in HEAD commit: 0c6c8d8c809f697cd5fc581c6c08e9ad646c55a8
Found in base branch: master
Vulnerable Source Files (1)
/arch/x86/kvm/svm.c
Vulnerability Details
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
Publish Date: 2015-11-16
URL: CVE-2015-8104
CVSS 3 Score Details (5.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2015-8104
Release Date: 2015-11-16
Fix Resolution: v4.4-rc1,v3.12.51,v3.16.35,v3.2.74,v4.1.17,v4.3.5
Step up your Open Source Security Game with Mend here