Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 7 Apr 2014 17:38:15 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest
 ioapic redirection table

It was found that invalid entries in guest ioapic redirection table
could lead to BUG_ON in ioapic_deliver() function.

A privileged user in the guest could use this flaw to crash the host.

Upstream fix:
https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1081589

-- 
Petr Matousek / Red Hat Security Response Team
PGP: 0xC44977CA 8107 AF16 A416 F9AF 18F3  D874 3E78 6F42 C449 77CA

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.