|
Message-ID: <alpine.LFD.2.20.1511100841340.20288@wniryva> Date: Tue, 10 Nov 2015 08:46:26 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: CVE-2015-8104 kernel: kvm: guest to host DoS by triggering an infinite loop in microcode via #DB exception -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, A guest to host DoS issue was found affecting various hypervisors. In that, a a guest can DoS the host by triggering an infinite stream of "debug check" (#DB) exceptions. This causes the microcode to enter an infinite loop where the core never receives another interrupt. The host kernel panics due to this effect. Reference: - ---------- -> https://bugzilla.redhat.com/show_bug.cgi?id=1278496 Thank you. - -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWQWGKAAoJEN0TPTL+WwQfE10P/RZp6169cBa+wBCZc5I9shuW Hvl3JRDkOGJJnc6Jjg01cFnqBSIbncNWo4acq6PosPrlVanaeSAGXkzWq/oszLcj uZevt8nQN9caOvNivLUEHMLtWBXNCojLWObABj7BvrLL32JIAgkO0cEceS6cb8Vt rOCWNpWaj+FaSh36UreC8tTAsUxneXw+BuuN2+uasXWIJYZeJCekK916rjS9WAr2 bEdYmk0P4cnIQ+u+8cdEzmz07He8WSIQ8jrpiyz+7zVCj7Z7BjyR8cEyiySZRJlC errCzmGKXTXH38M5aYv4s+ZDSHKiE5xngcao0slGIOFXz0nLCNqqk1gUSsuH97Cx CNH8UujEafM+YC2GBElFZKhDzbMpJEcQodtEIgQ1exCU8GoexCTzsDctrXMtA5Zp 2y2O8IA++fFQ6CeqiC0zuzh6OSRm8C65OVFyzbrmpNMiaZpUNmLe2SdSOQhwBlLJ fTQymbEe6wWvXooU2rR4RU0+6DkEMmWbCLA2aAZMtyLNny6IqFVHYlnZM3mkpvZT p33N8ALlJjjgmSTRUPkFzWKcVNbZ8K6kBzGMW3/TIC2l3vb74JNzp1SEisUcpTgt oKTAfyRrF7GwNPBwi1UxpYfvKOj62RZU+wTYoldvyjrvmqsvMNmdDxh5yw/aKANS K0CMyjpUBGXe2x2qG8d9 =3ufF -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.