6.1 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:N/I:N/A:C
kernel is vulnerable to denial of service. A flaw was found in the way the Xen hypervisor implementation handled instruction emulation during virtual machine exits. A malicious user-space process running in an SMP guest could trick the emulator into reading a different instruction than the one that caused the virtual machine to exit. An unprivileged guest user could trigger this flaw to crash the host. This only affects systems with both an AMD x86 processor and the AMD Virtualization (AMD-V) extensions enabled.
rhn.redhat.com/errata/RHSA-2011-1065.html
rhn.redhat.com/errata/RHSA-2011-1163.html
www.openwall.com/lists/oss-security/2011/07/07/3
access.redhat.com/errata/RHSA-2011:1163
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=702657
rhn.redhat.com/errata/RHSA-2009-1243.html
rhn.redhat.com/errata/RHSA-2011-1065.html