Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vmj3-p7xv-c3c3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.

The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.

EPSS

Процентиль: 27%
0.00089
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.

redhat
больше 12 лет назад

The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.

nvd
больше 12 лет назад

The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.

debian
больше 12 лет назад

The KVM subsystem in the Linux kernel before 3.6.9, when running on ho ...

oracle-oval
больше 12 лет назад

ELSA-2013-0223: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 27%
0.00089
Низкий