Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-2938

Published: 8 October 2010

arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware support for these fields, which allows local users to cause a denial of service (host OS crash) by requesting a VMCS dump for a fully virtualized Xen guest.

Notes

AuthorNote
kees
for full-virtualization issues, add qemu (and kvm)

Priority

Low

Status

Package Release Status
xen-3.1
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Ignored
(end of life)
jaunty Does not exist

karmic Does not exist

lucid Does not exist

maverick Does not exist

natty Does not exist

oneiric Does not exist

upstream Needs triage

xen-3.2
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Not vulnerable

jaunty Does not exist

karmic Does not exist

lucid Does not exist

maverick Does not exist

natty Does not exist

oneiric Does not exist

upstream Not vulnerable

Patches:
upstream: http://xenbits.xensource.com/xen-unstable.hg?rev/15911
xen-3.3
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Does not exist

jaunty Not vulnerable

karmic Not vulnerable

lucid Not vulnerable

maverick Not vulnerable

natty Not vulnerable

oneiric Does not exist

upstream Not vulnerable