First published: Thu Mar 04 2010(Updated: )
Gleb Napatov found a bug in KVM that can be used to crash the host on Intel machines. If emulator is tricked into emulating mov to/from DR instruction it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr are not initialized. Recently this is not exploitable from guest userspace, but malicious guest kernel can trigger it easily.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
debian/user-mode-linux | ||
Red Hat Enterprise Virtualization | =2.2 | |
Red Hat KVM | =83 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0435 has a high severity rating as it can lead to crashes on Intel host machines.
To fix CVE-2010-0435, users should update their KVM and Linux packages to the latest versions provided by their distribution.
CVE-2010-0435 affects certain versions of Linux kernel and KVM, specifically those prior to the patches that address this vulnerability.
No, CVE-2010-0435 is not currently exploitable from guest user space according to recent assessments.
The bug associated with CVE-2010-0435 was discovered by Gleb Napatov.