---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Linux Kernel KVM Port 80h Denial of Service Security Issue SECUNIA ADVISORY ID: SA35127 VERIFY ADVISORY: http://secunia.com/advisories/35127/ DESCRIPTION: A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The security issue is caused due to the KVM implementation allowing a guest machine direct access to host port 80h and can be exploited to hang the host system. NOTE: The security issue only affects certain AMD platforms. The security issue is reported in versions prior to 2.6.30-rc6. SOLUTION: Fixed in 2.6.30-rc6. PROVIDED AND/OR DISCOVERED BY: Piotr Jaroszynski ORIGINAL ADVISORY: http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc6 http://git.kernel.org/linus/99f85a28a78e96d28907fe036e1671a218fee597 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------