Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.31.4 allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Linux |
|
Configuration 1 [-]
|
No data.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published: 2009-10-29T14:00:00
Updated: 2024-08-07T06:38:28.459Z
Reserved: 2009-10-09T00:00:00
Link: CVE-2009-3638

No data.

Status : Modified
Published: 2009-10-29T14:30:01.233
Modified: 2024-11-21T01:07:51.830
Link: CVE-2009-3638
