VYPR
Unrated severityNVD Advisory· Published Nov 30, 2014· Updated May 6, 2026

CVE-2010-5313

CVE-2010-5313

Description

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: <=2.6.37

Patches

1
fc3a9157d314

KVM: X86: Don't report L2 emulation failures to user-space

https://github.com/torvalds/linuxJoerg RoedelNov 29, 2010via osv
1 file changed · +10 4
  • arch/x86/kvm/x86.c+10 4 modified
    @@ -4314,13 +4314,19 @@ EXPORT_SYMBOL_GPL(kvm_inject_realmode_interrupt);
     
     static int handle_emulation_failure(struct kvm_vcpu *vcpu)
     {
    +	int r = EMULATE_DONE;
    +
     	++vcpu->stat.insn_emulation_fail;
     	trace_kvm_emulate_insn_failed(vcpu);
    -	vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
    -	vcpu->run->internal.suberror = KVM_INTERNAL_ERROR_EMULATION;
    -	vcpu->run->internal.ndata = 0;
    +	if (!is_guest_mode(vcpu)) {
    +		vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
    +		vcpu->run->internal.suberror = KVM_INTERNAL_ERROR_EMULATION;
    +		vcpu->run->internal.ndata = 0;
    +		r = EMULATE_FAIL;
    +	}
     	kvm_queue_exception(vcpu, UD_VECTOR);
    -	return EMULATE_FAIL;
    +
    +	return r;
     }
     
     static bool reexecute_instruction(struct kvm_vcpu *vcpu, gva_t gva)
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

10

News mentions

0

No linked articles in our index yet.