SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(CentOS Issues Fix for the Linux Kernel) Xen Exception Handling Bugs Let Local Users on a Guest System Cause Denial of Service Conditions on the Host System
SecurityTracker Alert ID:  1034435
SecurityTracker URL:  http://securitytracker.com/id/1034435
CVE Reference:   CVE-2015-5307, CVE-2015-8104   (Links to External Site)
Date:  Dec 16 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): CentOS 6
Description:   Two vulnerabilities were reported in Xen. A local user on the guest system can cause denial of service conditions on the host system. The Linux Kernel is affected.

The processing of benign exceptions may result in an infinite loop in the CPU. A local user on the guest system can exploit this to cause denial of service conditions on the host system.

An alignment check exception may be triggered by a 32-bit guest [CVE-2015-5307].

A debug exception can be triggered [CVE-2015-8104].

ARM is not affected.

x86 PV VMs are not affected.

x86 CPUs from all manufacturers are affected.

Ben Serebrin from Google and Jan Beulich from SUSE reported these vulnerabilities.

Impact:   A local user on the guest system can cause denial of service conditions on the host system.
Solution:   CentOS has issued a fix for the Linux Kernel.

i386:
08a3881a331e0147dba2e8adbbb9e2383e11043e0d4bc8eb590e3316ce1bbf3e kernel-2.6.32-573.12.1.el6.i686.rpm
722215736c71bbd99f017636c7653bc74c6a3b0d95ff2852fb658189751935bc kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
aff1ca2d87de43b4baf620a7109f28d4d988897b2508c436456781c54973833e kernel-debug-2.6.32-573.12.1.el6.i686.rpm
52aa7b57b9c42bd80e87309c07dd8b2c82a1260dd016c8b21ea29818c8f3748d kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
d6584dedfa1bbdec3a4e3dbd9afaf291db744d86f9f98e8728359ed06a704c3d kernel-devel-2.6.32-573.12.1.el6.i686.rpm
0e27624725a46d457cb9581934a88ed1d198418ecaa847d3ebfb88d3af3cf454 kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
00c538233e8572fa9ba085b6c308dc169c0a779884195b0f5380c8220428fc51 kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
58c0e63ff1b899a30377f09a9edb172e53cc84eca258d0bbc2ff18d83086468e kernel-headers-2.6.32-573.12.1.el6.i686.rpm
5b90155f6d7c4dde0142fd7e19a68c014dc5c76b0b11add80120c8325da7937b perf-2.6.32-573.12.1.el6.i686.rpm
f2b199f012c0e58c37c4cb309367e1f709fa4ad804bdb764dcc9f5066230b56c python-perf-2.6.32-573.12.1.el6.i686.rpm

x86_64:
2049c671772566932bff2071b7614ec9657a1909b54f02eaf061bec3b655b975 kernel-2.6.32-573.12.1.el6.x86_64.rpm
722215736c71bbd99f017636c7653bc74c6a3b0d95ff2852fb658189751935bc kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
9856d5b7e763214eaaa5c17a270ce25c2de8eef361f35cdcd7c46761ba51400c kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm
52aa7b57b9c42bd80e87309c07dd8b2c82a1260dd016c8b21ea29818c8f3748d kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
595a8ed5e76cdd8ef19f4c670e66e7e0f6139fb496b5044c3ab89e06df9a196a kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm
f418c504740b20dfd46fd02a9aa93cfdbd0b802a389c71256ab7819087b61a26 kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm
0e27624725a46d457cb9581934a88ed1d198418ecaa847d3ebfb88d3af3cf454 kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
00c538233e8572fa9ba085b6c308dc169c0a779884195b0f5380c8220428fc51 kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
dcb27d50fce3d4b8a6f6e0769332852a7221081fbfdab44ae2671513f36a63fc kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm
c1b0ec00ffa6e3e826087bd24150ffed458fb3ad4c8b82f9d9e8252921a739d6 perf-2.6.32-573.12.1.el6.x86_64.rpm
9f4535784559270eaf8c798c394807de9940acf36a2f034e892c5e2bb3f483d2 python-perf-2.6.32-573.12.1.el6.x86_64.rpm

Source:
fbb60b14b498858173375845e531f61303f40e62a697bfdb6cc8ff2422bc8df6 kernel-2.6.32-573.12.1.el6.src.rpm

Cause:   Exception handling error

Message History:   This archive entry is a follow-up to the message listed below.
Nov 10 2015 Xen Exception Handling Bugs Let Local Users on a Guest System Cause Denial of Service Conditions on the Host System



 Source Message Contents

Subject:  [CentOS-announce] CESA-2015:2636 Important CentOS 6 kernel Security Update


CentOS Errata and Security Advisory 2015:2636 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2636.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
08a3881a331e0147dba2e8adbbb9e2383e11043e0d4bc8eb590e3316ce1bbf3e  kernel-2.6.32-573.12.1.el6.i686.rpm
722215736c71bbd99f017636c7653bc74c6a3b0d95ff2852fb658189751935bc  kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
aff1ca2d87de43b4baf620a7109f28d4d988897b2508c436456781c54973833e  kernel-debug-2.6.32-573.12.1.el6.i686.rpm
52aa7b57b9c42bd80e87309c07dd8b2c82a1260dd016c8b21ea29818c8f3748d  kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
d6584dedfa1bbdec3a4e3dbd9afaf291db744d86f9f98e8728359ed06a704c3d  kernel-devel-2.6.32-573.12.1.el6.i686.rpm
0e27624725a46d457cb9581934a88ed1d198418ecaa847d3ebfb88d3af3cf454  kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
00c538233e8572fa9ba085b6c308dc169c0a779884195b0f5380c8220428fc51  kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
58c0e63ff1b899a30377f09a9edb172e53cc84eca258d0bbc2ff18d83086468e  kernel-headers-2.6.32-573.12.1.el6.i686.rpm
5b90155f6d7c4dde0142fd7e19a68c014dc5c76b0b11add80120c8325da7937b  perf-2.6.32-573.12.1.el6.i686.rpm
f2b199f012c0e58c37c4cb309367e1f709fa4ad804bdb764dcc9f5066230b56c  python-perf-2.6.32-573.12.1.el6.i686.rpm

x86_64:
2049c671772566932bff2071b7614ec9657a1909b54f02eaf061bec3b655b975  kernel-2.6.32-573.12.1.el6.x86_64.rpm
722215736c71bbd99f017636c7653bc74c6a3b0d95ff2852fb658189751935bc  kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
9856d5b7e763214eaaa5c17a270ce25c2de8eef361f35cdcd7c46761ba51400c  kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm
52aa7b57b9c42bd80e87309c07dd8b2c82a1260dd016c8b21ea29818c8f3748d  kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
595a8ed5e76cdd8ef19f4c670e66e7e0f6139fb496b5044c3ab89e06df9a196a  kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm
f418c504740b20dfd46fd02a9aa93cfdbd0b802a389c71256ab7819087b61a26  kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm
0e27624725a46d457cb9581934a88ed1d198418ecaa847d3ebfb88d3af3cf454  kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
00c538233e8572fa9ba085b6c308dc169c0a779884195b0f5380c8220428fc51  kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
dcb27d50fce3d4b8a6f6e0769332852a7221081fbfdab44ae2671513f36a63fc  kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm
c1b0ec00ffa6e3e826087bd24150ffed458fb3ad4c8b82f9d9e8252921a739d6  perf-2.6.32-573.12.1.el6.x86_64.rpm
9f4535784559270eaf8c798c394807de9940acf36a2f034e892c5e2bb3f483d2  python-perf-2.6.32-573.12.1.el6.x86_64.rpm

Source:
fbb60b14b498858173375845e531f61303f40e62a697bfdb6cc8ff2422bc8df6  kernel-2.6.32-573.12.1.el6.src.rpm



-- 
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC