Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1936

Опубликовано: 07 янв. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 4.6

Описание

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

not-affected

precise

not-affected

quantal

not-affected

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

maverick

ignored

end of life
natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

4.6 Medium

CVSS2

Связанные уязвимости

redhat
почти 14 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

nvd
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

debian
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extens ...

github
около 3 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

oracle-oval
почти 14 лет назад

ELSA-2011-0927: kernel security and bug fix update (IMPORTANT)

4.6 Medium

CVSS2

Уязвимость CVE-2011-1936