Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2011-0927.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/07/07/3 | mailing list |