Upstream information
Description
The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) to restrict instruction execution, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, and replacing an instruction in between emulator entry and instruction fetch, a related issue to CVE-2010-0298.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.1 |
Vector | AV:L/AC:M/Au:S/C:P/I:P/A:P |
Access Vector | Local |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Note from the SUSE Security Team
KVM virtualization is not present in SUSE Linux Enterprise 9 and SUSE Linux Enterprise 10, so neither of them are affected by this issue. SUSE Bugzilla entry: 577079 [RESOLVED / WONTFIX] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Fri Jun 28 03:30:53 2013CVE page last modified: Sat Jul 1 19:16:03 2023