First published: Fri Mar 12 2010(Updated: )
Paolo Bonzini found a bug in Xen hypervisor that can be used to crash the guest. Malicious guest userspace process can trick the hypervisor into emulating instruction that causes the crash if it has access to an MMIO region. The bug can be exploited because of an inconsistency between instruction decoding tables and the actual MMIO instruction decoder implementation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Linux Kernel | =2.6.18 | |
All of | ||
Any of | ||
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Linux Kernel | =2.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0730 is considered a medium to high severity vulnerability due to its potential to crash the guest operating system.
To fix CVE-2010-0730, it is recommended to update your Red Hat Enterprise Linux to the latest available patches addressing this vulnerability.
CVE-2010-0730 affects Red Hat Enterprise Linux version 5 and some of its variants including client and server versions.
The CVE-2010-0730 vulnerability can be exploited by a malicious user in the guest environment to crash the hypervisor by invoking specific instructions.
There are no easy workarounds for CVE-2010-0730, so applying the security updates is the recommended approach.