4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:S/C:N/I:N/A:C
kernel is vulnerable to denial of service (DoS). The vulnerability exists as a flaw in the Xen hypervisor IOMMU error handling implementation could allow a privileged guest user, within a guest operating system that has direct control of a PCI device, to cause performance degradation on the host and possibly cause it to hang.
old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html
old-list-archives.xen.org/archives/html/xen-devel/2011-08/msg00450.html
secunia.com/advisories/45622
secunia.com/advisories/51468
www.debian.org/security/2012/dsa-2582
www.securityfocus.com/bid/49146
xenbits.xen.org/hg/staging/xen-4.1-testing.hg/rev/84e3706df07a
access.redhat.com/errata/RHSA-2011:1386
access.redhat.com/security/updates/classification/#important
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1386
rhn.redhat.com/errata/RHSA-2011-1065.html
rhn.redhat.com/errata/RHSA-2011-1241.html