CVE-2012-0045

CVE Details

Release Date:2012-07-03
Impact:None What is this?

Description


The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.

See more information about CVE-2012-0045 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 4.7
Vector String: AV:L/AC:M/Au:N/C:N/I:N/A:C
Version: 2.0
Attack Vector: Local
Attack Complexity: Medium
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2012-20032012-03-07
Oracle Linux version 5 (mlnx_en-2.6.32-300.11.1.el5uek)ELSA-2012-20032012-03-07
Oracle Linux version 5 (ofa-2.6.32-300.11.1.el5uek)ELSA-2012-20032012-03-07
Oracle Linux version 6 (kernel)ELSA-2012-03502012-03-06
Oracle Linux version 6 (kernel-uek)ELSA-2012-20032012-03-07
Oracle Linux version 6 (mlnx_en-2.6.32-300.11.1.el6uek)ELSA-2012-20032012-03-07
Oracle Linux version 6 (ofa-2.6.32-300.11.1.el6uek)ELSA-2012-20032012-03-07


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete