** Description changed: - 32bit guests will crash (and 64bit guests may behave in a wrong way) for - example by simply executing following nasm-demo-application: The reason - seems a missing "invalid opcode"-trap (int6) for the syscall opcode - "0f05", which is not available on Intel CPUs within non-longmodes, as - also on some AMD CPUs within legacy-mode. (depending on CPU vendor, - MSR_EFER and cpuid) + The em_syscall function in arch/x86/kvm/emulate.c in the KVM + implementation in the Linux kernel before 3.2.14 does not properly + handle the 0f05 (aka syscall) opcode, which allows guest OS users to + cause a denial of service (guest OS crash) via a crafted application, as + demonstrated by an NASM file. Break-Fix: e66bb2ccdcf76d032bbb464b35c292bb3ee58f9b bdb42f5afebe208eae90406959383856ae2caf2b Break-Fix: e66bb2ccdcf76d032bbb464b35c292bb3ee58f9b c2226fc9e87ba3da060e47333657cd6616652b84
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/917842 Title: CVE-2012-0045 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917842/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs