|Description||The kvm_emulate_hypercall function in arch/x86/kvm/x86.c in KVM in the Linux kernel 2.6.25-rc1, and other versions before 2.6.31, when running on x86 systems, does not prevent access to MMU hypercalls from ring 0, which allows local guest OS users to cause a denial of service (guest kernel crash) and read or write guest kernel memory via unspecified "random addresses."|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1907-1, DSA-1915-1, DTSA-203-1|
|NVD severity||high (attack range: local)|
The information below is based on the following data on fixed versions.
[etch] - linux-2.6 <not-affected> (introduced in 2.6.25)
- linux-2.6.24 <not-affected> (introduced in 2.6.25)