The WRMSR processing functionality in the KVM subsystem in the Linux kernel up to and including 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 10.04 |
||
debian debian linux 7.0 |
||
opensuse evergreen 11.4 |
||
suse suse linux enterprise server 11 |