Critical severity10.0NVD Advisory· Published Nov 16, 2015· Updated May 6, 2026
CVE-2015-8104
CVE-2015-8104
Description
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
Affected products
26- cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*Range: >=4.0.0,<=4.0.34
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
43- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchVendor Advisory
- www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlnvdPatchThird Party Advisory
- xenbits.xen.org/xsa/advisory-156.htmlnvdPatchVendor Advisory
- github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377dnvdIssue TrackingPatchVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2015-12/msg00039.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2015-12/msg00053.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-2636.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-2645.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-0046.htmlnvdThird Party Advisory
- support.citrix.com/article/CTX202583nvdThird Party Advisory
- support.citrix.com/article/CTX203879nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3414nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3426nvdThird Party Advisory
- www.debian.org/security/2016/dsa-3454nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/11/10/5nvdMailing ListThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/77524nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/91787nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034105nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2840-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2841-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2841-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2842-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2842-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2843-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2843-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2844-1nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingVendor Advisory
- kb.juniper.net/JSA10783nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2023/10/10/4nvd
News mentions
0No linked articles in our index yet.