The handle_dr function in arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 188.8.131.52 does not properly verify the Current Privilege Level (CPL) before accessing a debug register, which allows guest OS users to cause a denial of service (trap) on the host OS via a crafted application.
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3722
The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update will address this flaw.
CVE-2009-3722 KVM: Check cpl before emulating debug register access
Red Hat Security Errata
|Red Hat Enterprise Linux Virtualization 5 (kvm)
|Red Hat Enterprise Virtualization Hypervisor 5 (rhev-hypervisor)