CVE-2010-3698 (retired)

Priority
Description
The KVM implementation in the Linux kernel before 2.6.36 does not properly
reload the FS and GS segment registers, which allows host OS users to cause
a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction
with a modified Local Descriptor Table (LDT).
Ubuntu-Description
It was discovered that KVM did not correctly initialize certain CPU
registers. A local attacker could exploit this to crash the system, leading
to a denial of service.
Notes
 smb: There is no KVM in Dapper, so that cannot be affected. Maverick needed
 smb: some adaption as a previous stable patch moved code around. Lucid had
 smb: it already. Karmic mostly cherry-pick. Hardy needed more twisting.
Assigned-to
smb
Package
Upstream:released (2.6.36)
Package
Upstream:released (2.6.36)
Package
Upstream:released (2.6.36)
Package
Upstream:released (2.6.36)
Package
Upstream:released (2.6.36)
Package
Upstream:released (2.6.36)
Package
Upstream:released (2.6.36)
More Information

Updated: 2019-08-23 08:41:11 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)