CVE-2010-2938

Published: 08 October 2010

arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware support for these fields, which allows local users to cause a denial of service (host OS crash) by requesting a VMCS dump for a fully virtualized Xen guest.

Priority

Low

Status

Package Release Status
xen-3.1
Launchpad, Ubuntu, Debian
Upstream Needs triage

xen-3.2
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

Patches:
Upstream: http://xenbits.xensource.com/xen-unstable.hg?rev/15911
xen-3.3
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

Notes

AuthorNote
kees
for full-virtualization issues, add qemu (and kvm)

References