First published: Fri Mar 12 2010(Updated: )
Paolo Bonzini found a bug in Xen hypervisor that can be used to crash the guest. Malicious guest userspace process can trick the hypervisor into emulating instruction that causes the crash if it has access to an MMIO region. The bug can be exploited because of an inconsistency between instruction decoding tables and the actual MMIO instruction decoder implementation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =5-ga | |
Redhat Enterprise Linux | =5-ga | |
Redhat Enterprise Linux | =5-ga | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Linux Linux kernel | =2.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.