The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2012-07-03T16:00:00

Updated: 2024-08-06T18:09:17.222Z

Reserved: 2011-12-07T00:00:00

Link: CVE-2012-0045

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2012-07-03T16:40:31.397

Modified: 2023-02-13T03:24:14.087

Link: CVE-2012-0045

cve-icon Redhat

Severity : Moderate

Publid Date: 2011-12-29T00:00:00Z

Links: CVE-2012-0045 - Bugzilla