First published: Thu Mar 04 2010(Updated: )
Gleb Napatov found a bug in KVM that can be used to crash the host on Intel machines. If emulator is tricked into emulating mov to/from DR instruction it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr are not initialized. Recently this is not exploitable from guest userspace, but malicious guest kernel can trigger it easily.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Virtualization | =2.2 | |
Redhat Kvm | =83 | |
debian/linux-2.6 | ||
debian/user-mode-linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.