The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2443-1 | linux-2.6 security update |
EUVD |
EUVD-2012-0085 | The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file. |
Ubuntu USN |
USN-1421-1 | Linux kernel (Maverick backport) vulnerabilities |
Ubuntu USN |
USN-1422-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1425-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1426-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-1431-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1433-1 | Linux kernel (Oneiric backport) vulnerabilities |
Ubuntu USN |
USN-1440-1 | Linux kernel (Natty backport) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T18:09:17.222Z
Reserved: 2011-12-07T00:00:00
Link: CVE-2012-0045
No data.
Status : Deferred
Published: 2012-07-03T16:40:31.397
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-0045
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN