The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2012-07-03 09:40
Updated : 2023-02-12 19:24
NVD link : CVE-2012-0045
Mitre link : CVE-2012-0045
JSON object : View
CWE
Products Affected
linux
- linux_kernel