Описание
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
Отчет
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1065.html. Also, only systems running on x86 architecture with AMD processor and SVM virtualization extension enabled are affected.
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS2
Связанные уязвимости
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
The instruction emulation in Xen 3.0.3 allows local SMP guest users to ...
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
ELSA-2011-1065: Oracle Linux 5.7 kernel security and bug fix update (IMPORTANT)
EPSS
6.1 Medium
CVSS2