First published: Fri Mar 12 2010(Updated: )
Paolo Bonzini found a bug in Xen hypervisor that can be used to crash the guest. Malicious guest userspace process can trick the hypervisor into emulating instruction that causes the crash if it has access to an MMIO region. The bug can be exploited because of an inconsistency between instruction decoding tables and the actual MMIO instruction decoder implementation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5.0 | |
redhat enterprise Linux desktop | =5.0 | |
Linux Kernel | =2.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.