Description
The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2153-1 | linux-2.6 security update |
EUVD |
EUVD-2010-3683 | The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap. |
Ubuntu USN |
USN-1072-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:18:53.085Z
Reserved: 2010-10-01T00:00:00.000Z
Link: CVE-2010-3699
No data.
Status : Modified
Published: 2010-12-08T20:00:01.087
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-3699
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN