Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2012-0045: oss-security - Re: CVE request -

The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.

CVE
#web#mac#windows#linux#red_hat#dos#git#intel#php#perl#amd#auth
  • Products
    • Openwall GNU/*/Linux server OS
    • Linux Kernel Runtime Guard
    • John the Ripper password cracker
      • Free & Open Source for any platform
      • in the cloud
      • Pro for Linux
      • Pro for macOS
    • Wordlists for password cracking
    • passwdqc policy enforcement
      • Free & Open Source for Unix
      • Pro for Windows (Active Directory)
    • yescrypt KDF & password hashing
    • yespower Proof-of-Work (PoW)
    • crypt_blowfish password hashing
    • phpass ditto in PHP
    • tcb better password shadowing
    • Pluggable Authentication Modules
    • scanlogd port scan detector
    • popa3d tiny POP3 daemon
    • blists web interface to mailing lists
    • msulogin single user mode login
    • php_mt_seed mt_rand() cracker
  • Services
  • Publications
    • Articles
    • Presentations
  • Resources
    • Mailing lists
    • Community wiki
    • Source code repositories (GitHub)
    • Source code repositories (CVSweb)
    • File archive & mirrors
    • How to verify digital signatures
    • OVE IDs
  • What’s new

[<prev] [next>] [<thread-prev] [day] [month] [year] [list]

Date: Wed, 11 Jan 2012 17:09:25 -0700 From: Kurt Seifried <kseifried@…hat.com> To: oss-security@…ts.openwall.com Subject: Re: CVE request – kernel: kvm: syscall instruction induced guest panic

On 01/11/2012 01:19 PM, Petr Matousek wrote:

"32bit guests will crash (and 64bit guests may behave in a wrong way) for example by simply executing following nasm-demo-application:

\[bits 32\]
global \_start
SECTION .text
\_start: syscall

The reason seems a missing “invalid opcode”-trap (int6) for the syscall opcode "0f05", which is not available on Intel CPUs within non-longmodes, as also on some AMD CPUs within legacy-mode. (depending on CPU vendor, MSR_EFER and cpuid)

Because previous mentioned OSs may not engage corresponding syscall target-registers (STAR, LSTAR, CSTAR), they remain NULL and (non trapping) syscalls are leading to multiple faults and finally crashs."

References: https://bugzilla.redhat.com/show_bug.cgi?id=773370 https://lkml.org/lkml/2011/12/28/170 http://www.spinics.net/lists/kvm/msg66633.html

Proposed patch: http://www.spinics.net/lists/kvm/msg66633.html

Credits: Stephan Bärwolf

Introduced by: e66bb2ccdcf76d032bbb464b35c292bb3ee58f9b in linux-2.6.32

Thanks, Please use CVE-2012-0045 for this issue.

– Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907