CVE-2012-0045

CVE Details

Release Date:2012-07-03

Description


The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.

See more information about CVE-2012-0045 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 4.7 Base Metrics: AV:L/AC:M/Au:N/C:N/I:N/A:C
Access Vector: Local network Attack Complexity: Medium
Authentication: None required Confidentiality Impact: None
Integrity Impact: None Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2012-20032012-03-07
Oracle Linux version 5 (mlnx_en-2.6.32-300.11.1.el5uek)ELSA-2012-20032012-03-07
Oracle Linux version 5 (ofa-2.6.32-300.11.1.el5uek)ELSA-2012-20032012-03-07
Oracle Linux version 6 (kernel)ELSA-2012-03502012-03-06
Oracle Linux version 6 (kernel-uek)ELSA-2012-20032012-03-07
Oracle Linux version 6 (mlnx_en-2.6.32-300.11.1.el6uek)ELSA-2012-20032012-03-07
Oracle Linux version 6 (ofa-2.6.32-300.11.1.el6uek)ELSA-2012-20032012-03-07



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete