Linux Kernel is vulnerable to a denial of service, caused by a NULL pointer dereference flaw in the kvm_dirty_ring_push function in virt/kvm/dirty_ring.c. By sending a specially-crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.
Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by an issue with allowing cmpxchg_gpte function to write to pfns outside the userspace region. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges or cause a denial of service condition.
Refer to Linux Kernel GIT Repository for patch, upgrade, or suggested workaround information.