Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
References
Configurations
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2011-0927.html - | |
References | () http://www.openwall.com/lists/oss-security/2011/07/07/3 - |
Information
Published : 2014-01-07 19:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-1936
Mitre link : CVE-2011-1936
CVE.ORG link : CVE-2011-1936
JSON object : View
Products Affected
xen
- xen
CWE