First published: Mon Aug 02 2010(Updated: )
arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware support for these fields, which allows local users to cause a denial of service (host OS crash) by requesting a VMCS dump for a fully virtualized Xen guest.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.18 | |
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2938 is classified as a moderate severity vulnerability.
To fix CVE-2010-2938, upgrade to a patched version of the Linux kernel that resolves this issue.
CVE-2010-2938 affects Linux Kernel version 2.6.18 and Red Hat Enterprise Linux 5 running on unsupported Intel platforms.
CVE-2010-2938 is a vulnerability related to improper verification of hardware support in the VMCS implementation.
Yes, CVE-2010-2938 can potentially be exploited if an attacker can execute code on the affected system.