First published: Wed Oct 03 2012(Updated: )
A flaw has been found in the way Linux kernel's KVM subsystem handled vcpu->arch.cr4 X86_CR4_OSXSAVE bit set upon guest enter. On hosts without the XSAVE feature an unprivileged local user could use this flaw to crash the system. Acknowledgements: Red Hat would like to thank Jon Howell for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-862900 is considered critical due to the potential for unprivileged local users to crash the system.
To fix REDHAT-BUG-862900, you should apply the latest kernel update provided by Red Hat.
REDHAT-BUG-862900 affects systems running the Red Hat Linux kernel without the XSAVE feature.
REDHAT-BUG-862900 is caused by a flaw in the KVM subsystem's handling of the vcpu->arch.cr4 X86_CR4_OSXSAVE bit upon guest entry.
No, REDHAT-BUG-862900 cannot be exploited remotely as it requires local access to the system.