Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqgc-3hgm-hrw9

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

EPSS

Процентиль: 67%
0.00552
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

redhat
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

nvd
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

msrc
больше 4 лет назад

Описание отсутствует

debian
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) ...

EPSS

Процентиль: 67%
0.00552
Низкий