CVE-2010-4255
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/01/2011
Last modified:
11/04/2025
Description
The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
Impact
Base Score 2.0
6.10
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:citrix:xen:*:*:*:*:*:*:*:* | 4.0.1 (including) | |
| cpe:2.3:a:citrix:xen:3.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:citrix:xen:3.4.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html
- http://openwall.com/lists/oss-security/2010/11/30/5
- http://openwall.com/lists/oss-security/2010/11/30/8
- http://secunia.com/advisories/42884
- http://secunia.com/advisories/46397
- http://www.redhat.com/support/errata/RHSA-2011-0017.html
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=658155
- http://lists.xensource.com/archives/html/xen-devel/2010-11/msg01650.html
- http://openwall.com/lists/oss-security/2010/11/30/5
- http://openwall.com/lists/oss-security/2010/11/30/8
- http://secunia.com/advisories/42884
- http://secunia.com/advisories/46397
- http://www.redhat.com/support/errata/RHSA-2011-0017.html
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=658155



