Vulnerability Description
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | - |
References
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- http://www.openwall.com/lists/oss-security/2011/07/07/3
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- http://www.openwall.com/lists/oss-security/2011/07/07/3
FAQ
What is CVE-2011-1936?
CVE-2011-1936 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause ...
How severe is CVE-2011-1936?
CVE-2011-1936 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1936?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.