CVE-2009-2287
Publication date 1 July 2009
Last updated 24 July 2024
Ubuntu priority
The kvm_arch_vcpu_ioctl_set_sregs function in the KVM in Linux kernel 2.6 before 2.6.30, when running on x86 systems, does not validate the page table root in a KVM_SET_SREGS call, which allows local users to cause a denial of service (crash or hang) via a crafted cr3 value, which triggers a NULL pointer dereference in the gfn_to_rmap function.
From the Ubuntu Security Team
Matt T. Yourst discovered that KVM did not correctly validate the page table root. A local attacker could exploit this to crash the system, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
kvm | ||
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
qemu-kvm | ||
Notes
Patch details
Package | Patch details |
---|---|
kvm | |
linux |