CVE-2011-1936 in Xeninfo

Zusammenfassung (Englisch)

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservieren

09.05.2011

Veröffentlichung

07.01.2014

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Do you know our Splunk app?

Download it now for free!