CWE
NVD-CWE-Other
Advisory Published
CVE Published
Updated

CVE-2010-4255

First published: Mon Nov 29 2010(Updated: )

The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
XenServer=3.4.0
XenServer=3.4.3
XenServer=3.2.0
XenServer=3.3.0
XenServer=4.0.0
XenServer=3.0.4
XenServer=3.3.2
XenServer=3.0.3
XenServer=3.1.3
XenServer=3.0.2
XenServer=3.1.2
XenServer=3.4.1
XenServer=3.2.2
XenServer=3.1.4
XenServer<=4.0.1
XenServer=3.2.3
XenServer=3.4.2
XenServer=3.3.1
XenServer=3.2.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2010-4255?

    CVE-2010-4255 has a severity rating that indicates it can lead to a denial of service on the host OS.

  • How do I fix CVE-2010-4255?

    To fix CVE-2010-4255, upgrade to a version of Xen greater than 4.0.1 where the vulnerability is addressed.

  • Which systems are affected by CVE-2010-4255?

    CVE-2010-4255 affects Xen versions 4.0.1 and earlier, specifically on 64-bit platforms with paravirtualization enabled.

  • What are the potential impacts of CVE-2010-4255?

    The potential impacts of CVE-2010-4255 include denial of service, leading to host OS instability.

  • Is CVE-2010-4255 a remote vulnerability?

    CVE-2010-4255 is not a remote vulnerability; it requires guest OS users to exploit it within their environment.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203