4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
kernel is vulnerable to denial of service. A flaw was found in the Xen hypervisor implementation when running a system that has an Intel CPU without Extended Page Tables (EPT) support. While attempting to dump information about a crashing fully-virtualized guest, the flaw could cause the hypervisor to crash the host as well. A user with permissions to configure a fully-virtualized guest system could use this flaw to crash the host.
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.5_Technical_Notes/kernel.html#id3512212
secunia.com/advisories/46397
support.avaya.com/css/P8/documents/100113326
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0723.html
www.securityfocus.com/archive/1/520102/100/0/threaded
www.securityfocus.com/bid/43578
www.vmware.com/security/advisories/VMSA-2011-0012.html
xenbits.xensource.com/xen-unstable.hg?rev/15911
access.redhat.com/errata/RHSA-2010:0723
bugzilla.redhat.com/show_bug.cgi?id=620490