Affected Versions:
Linux kernel 2.6.x
Vulnerability description:
Bugtraq id: rj82cve ID: CVE-2010-0435Linux Kernel is the Kernel used by open source operating system Linux. A null pointer reference vulnerability exists when the Intel VT-x extension is enabled for the processor on the host system. If the simulator is cheated and simulated
The mov to/from DR command may trigger this NULL pointer reference because kvm_x86_ops-> (set | get) _ dr is not initialized,
Host crash.
<* Reference
Gleb Natapov (
Gleb@redhat.com)
Https://bugzilla.redhat.com/show_bug.cgi? Format = multiple & amp; id = 570528
Https://www.redhat.com/support/errata/RHSA-2010-0622.html
Https://www.redhat.com/support/errata/RHSA-2010-0627.html
*>
Vendor patch: Linux ----- the current vendor has released the upgrade patch to fix this security problem, please go to the vendor's home page download: vendor (RHSA-2010: 0627-01) and the corresponding patch: RHSA-2010: 0627-01: Important: kvm security and bug fix update link: https://www.redhat.com/support/errata/RHSA-2010-0627.html