arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware support for these fields, which allows local users to cause a denial of service (host OS crash) by requesting a VMCS dump for a fully virtualized Xen guest.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/46397 - | |
References | () http://support.avaya.com/css/P8/documents/100113326 - | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0723.html - | |
References | () http://www.securityfocus.com/archive/1/520102/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/43578 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2011-0012.html - | |
References | () http://xenbits.xensource.com/xen-unstable.hg?rev/15911 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=620490 - |
Information
Published : 2010-10-08 21:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2938
Mitre link : CVE-2010-2938
CVE.ORG link : CVE-2010-2938
JSON object : View
Products Affected
linux
- linux_kernel
redhat
- enterprise_linux
CWE
CWE-399
Resource Management Errors