[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1962 kvm -- several vulnerabilities

ID: oval:org.mitre.oval:def:6977Date: (C)2010-05-24   (M)2024-02-19
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in kvm, a full virtualization system. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered an Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function. This allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function. It was discovered that the handle_dr function in the KVM subsystem does not properly verify the Current Privilege Level before accessing a debug register, which allows guest OS users to cause a denial of service on the host OS via a crafted application. It was discovered that the do_insn_fetch function in the x86 emulator in the KVM subsystem tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service on the host OS via unspecified manipulations related to SMP support.

Platform:
Debian 5.0
Product:
kvm
Reference:
DSA-1962
CVE-2009-3638
CVE-2009-3722
CVE-2009-4031
CVE    3
CVE-2009-3722
CVE-2009-4031
CVE-2009-3638
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies