Description: KVM: DoS via write flood to I/O port 0x80 References: http://www.openwall.com/lists/oss-security/2017/12/04/2 https://www.spinics.net/lists/kvm/msg159809.html Notes: Bugs: upstream: released (4.15-rc3) [d59d51f088014f25c2562de59b9abff4f42a7468] 4.9-upstream-stable: released (4.9.69) [6ead44d4b5b8b1ecfcbd2302f15028dab7774da3] 3.16-upstream-stable: released (3.16.52) [02b1dd5472cee5286ab1a9eb916c036ab2f86b78] 3.2-upstream-stable: released (3.2.97) [13b86808f7fabea496c02131f49fec46a84fb3c9] sid: released (4.14.7-1) 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/x86/kvm-vmx-remove-i-o-port-0x80-bypass-on-intel-hosts.patch] 3.16-jessie-security: released (3.16.51-3+deb8u1) [bugfix/x86/kvm-vmx-remove-i-o-port-0x80-bypass-on-intel-hosts.patch] 3.2-wheezy-security: released (3.2.96-1) [bugfix/x86/kvm-vmx-remove-i-o-port-0x80-bypass-on-intel-hosts.patch]