7.8
CVSSv2

CVE-2009-4031

Published: 29/11/2009 Updated: 13/02/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 695
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel prior to 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host OS via unspecified manipulations related to SMP support.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.32

linux linux kernel

Vendor Advisories

Amerigo Wang and Eric Sesterhenn discovered that the HFS and ext4 filesystems did not correctly check certain disk structures If a user were tricked into mounting a specially crafted filesystem, a remote attacker could crash the system or gain root privileges (CVE-2009-4020, CVE-2009-4308) ...
Several vulnerabilities have been discovered in kvm, a full virtualization system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-3638 It was discovered an Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function This allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_C ...