Oval Definition:oval:org.mitre.oval:def:6977
Revision Date:2014-06-23Version:20
Title:DSA-1962 kvm -- several vulnerabilities
Description:Several vulnerabilities have been discovered in kvm, a full virtualization system. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered an Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function. This allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function. It was discovered that the handle_dr function in the KVM subsystem does not properly verify the Current Privilege Level before accessing a debug register, which allows guest OS users to cause a denial of service on the host OS via a crafted application. It was discovered that the do_insn_fetch function in the x86 emulator in the KVM subsystem tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service on the host OS via unspecified manipulations related to SMP support.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2009-3638
CVE-2009-3722
CVE-2009-4031
DSA-1962
Platform(s):Debian GNU/Linux 5.0
Product(s):kvm
Definition Synopsis
  • Debian GNU/Linux 5.0 is installed
  • AND Architecture section
  • Architecture independent section
  • Installed architecture is all
  • AND kvm-source is earlier than 72+dfsg-5~lenny4
  • OR Architecture dependent section
  • Supported architectures section
  • Installed architecture is amd64
  • OR Installed architecture is i386
  • AND kvm is earlier than 72+dfsg-5~lenny4
  • BACK