Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1936

Опубликовано: 07 июл. 2011
Источник: redhat
CVSS2: 4.9

Описание

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

Отчет

The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-0927.html. Also, only systems running on x86 architecture with Intel processor and VMX virtualization extension enabled are affected.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=706323kernel: xen: vmx: insecure cpuid vmexit

4.9 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

nvd
почти 12 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

debian
почти 12 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extens ...

github
больше 3 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

oracle-oval
больше 14 лет назад

ELSA-2011-0927: kernel security and bug fix update (IMPORTANT)

4.9 Medium

CVSS2