First published: Wed Jul 01 2009(Updated: )
The kvm_arch_vcpu_ioctl_set_sregs function in the KVM in Linux kernel 2.6 before 2.6.30, when running on x86 systems, does not validate the page table root in a KVM_SET_SREGS call, which allows local users to cause a denial of service (crash or hang) via a crafted cr3 value, which triggers a NULL pointer dereference in the gfn_to_rmap function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=2.6.0<2.6.30 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Debian | =4.0 | |
Debian | =5.0 | |
Linux Kernel | >=2.6.0<2.6.30 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2287 is classified as a high-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2009-2287, upgrade your Linux kernel to version 2.6.30 or later.
CVE-2009-2287 affects Linux kernel versions before 2.6.30 running on x86 systems, as well as specific versions of Ubuntu and Debian.
While CVE-2009-2287 primarily causes denial of service, it may indirectly lead to data loss due to system crashes or hangs.
Yes, there are known exploits for CVE-2009-2287 that could allow local users to crash or hang affected systems through crafted KVM_SET_SREGS calls.