** Description changed:

- 32bit guests will crash (and 64bit guests may behave in a wrong way) for
- example by simply executing following nasm-demo-application: The reason
- seems a missing "invalid opcode"-trap (int6) for the syscall opcode
- "0f05", which is not available on Intel CPUs within non-longmodes, as
- also on some AMD CPUs within legacy-mode. (depending on CPU vendor,
- MSR_EFER and cpuid)
+ The em_syscall function in arch/x86/kvm/emulate.c in the KVM
+ implementation in the Linux kernel before 3.2.14 does not properly
+ handle the 0f05 (aka syscall) opcode, which allows guest OS users to
+ cause a denial of service (guest OS crash) via a crafted application, as
+ demonstrated by an NASM file.
  
  Break-Fix: e66bb2ccdcf76d032bbb464b35c292bb3ee58f9b 
bdb42f5afebe208eae90406959383856ae2caf2b
  Break-Fix: e66bb2ccdcf76d032bbb464b35c292bb3ee58f9b 
c2226fc9e87ba3da060e47333657cd6616652b84

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/917842

Title:
  CVE-2012-0045

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/917842/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to