The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/38158 | vdb entry |
http://www.ubuntu.com/usn/USN-914-1 | vendor advisory |
http://www.vupen.com/english/advisories/2010/0638 | vdb entry |
https://rhn.redhat.com/errata/RHSA-2010-0088.html | vendor advisory |
http://secunia.com/advisories/38922 | third party advisory |
http://www.openwall.com/lists/oss-security/2010/02/02/4 | mailing list |
http://www.debian.org/security/2010/dsa-1996 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11095 | vdb entry signature |
https://bugzilla.redhat.com/show_bug.cgi?id=560887 | |
http://www.openwall.com/lists/oss-security/2010/02/02/1 | mailing list |
http://www.mail-archive.com/kvm%40vger.kernel.org/msg28002.html | mailing list |
https://rhn.redhat.com/errata/RHSA-2010-0095.html | patch vendor advisory |
http://secunia.com/advisories/38492 | third party advisory |