SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
(Oracle Issues Fix for the Linux Kernel) Xen Exception Handling Bugs Let Local Users on a Guest System Cause Denial of Service Conditions on the Host System
SecurityTracker Alert ID:  1034437
SecurityTracker URL:  http://securitytracker.com/id/1034437
CVE Reference:   CVE-2015-5307, CVE-2015-8104   (Links to External Site)
Date:  Dec 16 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Oracle Linux 6
Description:   Two vulnerabilities were reported in Xen. A local user on the guest system can cause denial of service conditions on the host system. The Linux Kernel is affected.

The processing of benign exceptions may result in an infinite loop in the CPU. A local user on the guest system can exploit this to cause denial of service conditions on the host system.

An alignment check exception may be triggered by a 32-bit guest [CVE-2015-5307].

A debug exception can be triggered [CVE-2015-8104].

ARM is not affected.

x86 PV VMs are not affected.

x86 CPUs from all manufacturers are affected.

Ben Serebrin from Google and Jan Beulich from SUSE reported these vulnerabilities.

Impact:   A local user on the guest system can cause denial of service conditions on the host system.
Solution:   Oracle has issued a fix for the Linux Kernel.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2015-2636.html

Vendor URL:  linux.oracle.com/errata/ELSA-2015-2636.html (Links to External Site)
Cause:   Exception handling error

Message History:   This archive entry is a follow-up to the message listed below.
Nov 10 2015 Xen Exception Handling Bugs Let Local Users on a Guest System Cause Denial of Service Conditions on the Host System



 Source Message Contents

Subject:  [El-errata] ELSA-2015-2636 Important: Oracle Linux 6 kernel security and bug fix update

Oracle Linux Security Advisory ELSA-2015-2636

http://linux.oracle.com/errata/ELSA-2015-2636.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
kernel-2.6.32-573.12.1.el6.i686.rpm
kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
kernel-debug-2.6.32-573.12.1.el6.i686.rpm
kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
kernel-devel-2.6.32-573.12.1.el6.i686.rpm
kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
kernel-headers-2.6.32-573.12.1.el6.i686.rpm
perf-2.6.32-573.12.1.el6.i686.rpm
python-perf-2.6.32-573.12.1.el6.i686.rpm

x86_64:
kernel-2.6.32-573.12.1.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm
kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm
kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm
perf-2.6.32-573.12.1.el6.x86_64.rpm
python-perf-2.6.32-573.12.1.el6.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/kernel-2.6.32-573.12.1.el6.src.rpm



Description of changes:

[2.6.32-573.12.1.el6]
- Revert: [netdrv] igb: add support for 1512 PHY (Stefan Assmann) 
[1278275 1238551]

[2.6.32-573.11.1.el6]
- [kvm] svm: unconditionally intercept DB (Paolo Bonzini) [1279467 
1279468] {CVE-2015-8104}
- [x86] virt: guest to host DoS by triggering an infinite loop in 
microcode (Paolo Bonzini) [1277557 1277559] {CVE-2015-5307}

[2.6.32-573.10.1.el6]
- [sound] Fix USB audio issues (wrong URB_ISO_ASAP semantics) (Jaroslav 
Kysela) [1273916 1255071]
- [security] keys: Don't permit request_key() to construct a new keyring 
(David Howells) [1275927 1273463] {CVE-2015-7872}
- [security] keys: Fix crash when attempt to garbage collect an 
uninstantiated keyring (David Howells) [1275927 1273463] {CVE-2015-7872}
- [security] keys: Fix race between key destruction and finding a 
keyring by name (David Howells) [1275927 1273463] {CVE-2015-7872}
- [ipc] Initialize msg/shm IPC objects before doing ipc_addid() 
(Stanislav Kozina) [1271504 1271505] {CVE-2015-7613}
- [fs] vfs: Test for and handle paths that are unreachable from their 
mnt_root (Eric W. Biederman) [1209368 1209369] {CVE-2015-2925}
- [fs] dcache: Handle escaped paths in prepend_path (Eric W. Biederman) 
[1209368 1209369] {CVE-2015-2925}
- [netdrv] igb: add support for 1512 PHY (Stefan Assmann) [1278275 1238551]
- [hid] fix unused rsize usage (Don Zickus) [1268203 1256568]
- [hid] fix data access in implement() (Don Zickus) [1268203 1256568]
- [fs] NFS: Hold i_lock in nfs_wb_page_cancel() while locking a request 
(Benjamin Coddington) [1273721 1135601]

[2.6.32-573.9.1.el6]
- [mm] hugetlb: fix race in region tracking (Herton R. Krzesinski) 
[1274599 1260755]
- [mm] hugetlb: improve, cleanup resv_map parameters (Herton R. 
Krzesinski) [1274599 1260755]
- [mm] hugetlb: unify region structure handling (Herton R. Krzesinski) 
[1274599 1260755]
- [mm] hugetlb: change variable name reservations to resv (Herton R. 
Krzesinski) [1274599 1260755]
- [fs] dcache: Log ELOOP rather than creating a loop (Benjamin 
Coddington) [1272858 1254020]
- [fs] dcache: Fix loop checks in d_materialise_unique (Benjamin 
Coddington) [1272858 1254020]



_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC