Описание
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
Linux kernel Virtualization Module (CONFIG_KVM) for the Intel processor family (CONFIG_KVM_INTEL) is vulnerable to a DoS issue. It could occur if a guest was to flood the I/O port 0x80 with write requests. A guest user could use this flaw to crash the host kernel resulting in DoS.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Will not fix | ||
Red Hat Enterprise Linux 7 | kernel-alt | Not affected | ||
Red Hat Enterprise MRG 2 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2018:0676 | 10.04.2018 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2018:1062 | 10.04.2018 |
Red Hat Enterprise Linux 7.4 Extended Update Support | kernel | Fixed | RHSA-2019:1170 | 14.05.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
4.6 Medium
CVSS2
Связанные уязвимости
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
The Linux Kernel 2.6.32 and later are affected by a denial of service, ...
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
ELSA-2018-4017: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
6.1 Medium
CVSS3
4.6 Medium
CVSS2