CVE-2009-3722 (retired)

Priority
Description
The handle_dr function in arch/x86/kvm/vmx.c in the KVM subsystem in the
Linux kernel before 2.6.31.1 does not properly verify the Current Privilege
Level (CPL) before accessing a debug register, which allows guest OS users
to cause a denial of service (trap) on the host OS via a crafted
application.
Ubuntu-Description
Avi Kivity discovered that KVM did not correctly check privileges when
accessing debug registers. A local attacker could exploit this to crash a
host system from within a guest system, leading to a denial of service.
Ubuntu 6.06 and 9.10 were not affected.
Package
Source: kvm (LP Ubuntu Debian)
Upstream:needs-triage
Package
Upstream:released (2.6.32~rc1)
Package
Upstream:released (2.6.32~rc1)
Package
Upstream:released (2.6.32~rc1)
Package
Upstream:released (2.6.32~rc1)
Package
Upstream:released (2.6.32~rc1)
Package
Upstream:released (2.6.32~rc1)
Package
Upstream:not-affected
More Information

Updated: 2019-03-26 11:49:22 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)