Description
The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host OS via unspecified manipulations related to SMP support.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1962-1 | New kvm packages fix several vulnerabilities |
EUVD |
EUVD-2009-4002 | The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host OS via unspecified manipulations related to SMP support. |
Ubuntu USN |
USN-894-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T06:45:50.938Z
Reserved: 2009-11-20T00:00:00.000Z
Link: CVE-2009-4031
No data.
Status : Modified
Published: 2009-11-29T13:07:32.250
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-4031
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN