Red Hat Bugzilla – Bug 1520328
CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
Last modified: 2018-08-28 18:27:05 EDT
Linux kernel built with the KVM virtualization(CONFIG_KVM) support for the Intel processor family(CONFIG_KVM_INTEL), is vulnerable to a DoS issue. It could occur if a guest was to flood the I/O port 0x80 with write requests. A guest user could use this flaw to crash the host kernel resulting in DoS. Upstream patch -------------- -> https://www.spinics.net/lists/kvm/msg159809.html Reference: ---------- -> http://www.openwall.com/lists/oss-security/2017/12/04/2
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1520331]
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2. This issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.
This was fixed for Fedora with the 4.14.6 stable updates
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0676 https://access.redhat.com/errata/RHSA-2018:0676
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:1062 https://access.redhat.com/errata/RHSA-2018:1062