Please excuse me for late reply - I missed your email initially somehow.

28.01.2011 00:59, Moritz Mühlenhoff wrote:
[]
> Thanks for the verbose explanation. I've updated the Debian 
> Security Tracker.
> 
> While we're at it; could you please also look into 
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?

That's a problem in the (host) kernel.

> Is this something that still needs to be fixed for Squeeze?

It is fixed in 2.6.32.27, by the following patch:

------------------
>From 85dedd445698c5bbd096289cfcc6034f74941815 Mon Sep 17 00:00:00 2001
From: Gleb Natapov <g...@redhat.com>
Date: Wed, 10 Nov 2010 12:08:12 +0200
Subject: KVM: VMX: fix vmx null pointer dereference on debug register access

There is a bug in KVM that can be used to crash a host on Intel
machines. If emulator is tricked into emulating mov to/from DR instruction
it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr
are not initialized. Recently this is not exploitable from guest
userspace, but malicious guest kernel can trigger it easily.

CVE-2010-0435

On upstream bug was fixed differently around 2.6.34.
------------------

As far as I can see, 2.6.32.27 patch is included in current debian
kernels.  So no action appears to be necessary.

Thanks!

/mjt



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to