Please excuse me for late reply - I missed your email initially somehow. 28.01.2011 00:59, Moritz Mühlenhoff wrote: [] > Thanks for the verbose explanation. I've updated the Debian > Security Tracker. > > While we're at it; could you please also look into > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?
That's a problem in the (host) kernel. > Is this something that still needs to be fixed for Squeeze? It is fixed in 2.6.32.27, by the following patch: ------------------ >From 85dedd445698c5bbd096289cfcc6034f74941815 Mon Sep 17 00:00:00 2001 From: Gleb Natapov <g...@redhat.com> Date: Wed, 10 Nov 2010 12:08:12 +0200 Subject: KVM: VMX: fix vmx null pointer dereference on debug register access There is a bug in KVM that can be used to crash a host on Intel machines. If emulator is tricked into emulating mov to/from DR instruction it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr are not initialized. Recently this is not exploitable from guest userspace, but malicious guest kernel can trigger it easily. CVE-2010-0435 On upstream bug was fixed differently around 2.6.34. ------------------ As far as I can see, 2.6.32.27 patch is included in current debian kernels. So no action appears to be necessary. Thanks! /mjt -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org