Upstream information
Description
The kvm_emulate_hypercall function in arch/x86/kvm/x86.c in KVM in the Linux kernel 2.6.25-rc1, and other versions before 2.6.31, when running on x86 systems, does not prevent access to MMU hypercalls from ring 0, which allows local guest OS users to cause a denial of service (guest kernel crash) and read or write guest kernel memory via unspecified "random addresses."SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 7.2 | 
| Vector | AV:L/AC:L/Au:N/C:C/I:C/A:C | 
| Access Vector | Local | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | Complete | 
| Integrity Impact | Complete | 
| Availability Impact | Complete | 
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 17:03:05 2013CVE page last modified: Mon Oct 6 18:15:55 2025