Description
The kvm_emulate_hypercall function in arch/x86/kvm/x86.c in KVM in the Linux kernel 2.6.25-rc1, and other versions before 2.6.31, when running on x86 systems, does not prevent access to MMU hypercalls from ring 0, which allows local guest OS users to cause a denial of service (guest kernel crash) and read or write guest kernel memory via unspecified "random addresses."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1907-1 | New kvm packages fix several vulnerabilities |
Debian DSA |
DSA-1915-1 | New Linux 2.6.26 packages fix several vulnerabilities |
EUVD |
EUVD-2009-3272 | The kvm_emulate_hypercall function in arch/x86/kvm/x86.c in KVM in the Linux kernel 2.6.25-rc1, and other versions before 2.6.31, when running on x86 systems, does not prevent access to MMU hypercalls from ring 0, which allows local guest OS users to cause a denial of service (guest kernel crash) and read or write guest kernel memory via unspecified "random addresses." |
Ubuntu USN |
USN-852-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:22:24.272Z
Reserved: 2009-09-22T00:00:00.000Z
Link: CVE-2009-3290
No data.
Status : Deferred
Published: 2009-09-22T10:30:00.717
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-3290
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN