Computer Security
[EN] securityvulns.ru no-pyccku


kvm privilege escalation
Published:13.10.2009
Source:
SecurityVulns ID:10310
Type:local
Threat Level:
5/10
Description:kvm_emulate_hypercall doesn't filter MMU hypercalls from ring 0.
Affected:LINUX : kernel 2.6
CVE:CVE-2009-3290 (The kvm_emulate_hypercall function in arch/x86/kvm/x86.c in KVM in the Linux kernel 2.6.25-rc1, and other versions before 2.6.31, when running on x86 systems, does not prevent access to MMU hypercalls from ring 0, which allows local guest OS users to cause a denial of service (guest kernel crash) and read or write guest kernel memory via unspecified "random addresses.")
 CVE-2008-5714 (Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1907-1] New kvm packages fix several vulnerabilities (13.10.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod