Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1936

Опубликовано: 07 янв. 2014
Источник: debian
EPSS Низкий

Описание

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6not-affectedpackage

EPSS

Процентиль: 25%
0.00084
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

redhat
около 14 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

nvd
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

github
около 3 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

oracle-oval
около 14 лет назад

ELSA-2011-0927: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 25%
0.00084
Низкий