The update_cr8_intercept function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.32-rc1 does not properly handle the absence of an Advanced Programmable Interrupt Controller (APIC), which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via a call to the kvm_vcpu_ioctl function.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 4.9 | MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
Not vulnerable. This issue did not affect the versions of KVM as shipped with Red Hat Enterprise Linux 5 as it does not contain the patch that introduced this vulnerability (upstream commit f0a3602c).
| Hyperlink | Source | Resource |
|---|---|---|
| http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88c808fd42b53a7e01a2ac3253ef31fef74cb5af | secalert@redhat.com | N/A |
| http://marc.info/?l=oss-security&m=125626965020571&w=2 | secalert@redhat.com | N/A |
| http://marc.info/?l=oss-security&m=125640417219385&w=2 | secalert@redhat.com | N/A |
| http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.32-rc1 | secalert@redhat.com | Vendor Advisory |
| http://www.securityfocus.com/bid/36805 | secalert@redhat.com | N/A |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/53947 | secalert@redhat.com | N/A |