Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2010-4255
Description:The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2010-4255
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42884
http://secunia.com/advisories/42884
46397
http://secunia.com/advisories/46397
RHSA-2011:0017
http://www.redhat.com/support/errata/RHSA-2011-0017.html
[oss-security] 20101130 CVE request: xen: x86-64: don't crash Xen upon direct pv guest access
http://openwall.com/lists/oss-security/2010/11/30/5
[oss-security] 20101130 Re: CVE request: xen: x86-64: don't crash Xen upon direct pv guest access
http://openwall.com/lists/oss-security/2010/11/30/8
[xen-devel] 20101129 [PATCH] x86-64: don't crash Xen upon direct pv guest access
http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=658155
https://bugzilla.redhat.com/show_bug.cgi?id=658155




© 1998-2025 E-Soft Inc. All rights reserved.