Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 7 Apr 2014 17:38:15 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest
 ioapic redirection table

It was found that invalid entries in guest ioapic redirection table
could lead to BUG_ON in ioapic_deliver() function.

A privileged user in the guest could use this flaw to crash the host.

Upstream fix:
https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1081589

-- 
Petr Matousek / Red Hat Security Response Team
PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3  D874 3E78 6F42 C449 77CA

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ