On Fri, Feb 04, 2011 at 01:35:11PM +0300, Michael Tokarev wrote:
> Please excuse me for late reply - I missed your email initially somehow.
> 
> 28.01.2011 00:59, Moritz Mühlenhoff wrote:
> []
> > Thanks for the verbose explanation. I've updated the Debian 
> > Security Tracker.
> > 
> > While we're at it; could you please also look into 
> > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 ?
> 
> That's a problem in the (host) kernel.
> 
> > Is this something that still needs to be fixed for Squeeze?
> 
> It is fixed in 2.6.32.27, by the following patch:
> 
> ------------------
> From 85dedd445698c5bbd096289cfcc6034f74941815 Mon Sep 17 00:00:00 2001
> From: Gleb Natapov <g...@redhat.com>
> Date: Wed, 10 Nov 2010 12:08:12 +0200
> Subject: KVM: VMX: fix vmx null pointer dereference on debug register access
> 
> There is a bug in KVM that can be used to crash a host on Intel
> machines. If emulator is tricked into emulating mov to/from DR instruction
> it causes NULL pointer dereference on VMX since kvm_x86_ops->(set|get)_dr
> are not initialized. Recently this is not exploitable from guest
> userspace, but malicious guest kernel can trigger it easily.
> 
> CVE-2010-0435
> 
> On upstream bug was fixed differently around 2.6.34.
> ------------------
> 
> As far as I can see, 2.6.32.27 patch is included in current debian
> kernels.  So no action appears to be necessary.

Thanks for the feedback, I've updated the Security Tracker.

Cheers,
        Moritz



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to