Upstream information
Description
arch/ia64/xen/faults.c in Xen 3.4 and 4.0 in Linux kernel 2.6.18, and possibly other kernel versions, when running on IA-64 architectures, allows local users to cause a denial of service and "turn on BE by modifying the user mask of the PSR," as demonstrated via exploitation of CVE-2006-0742.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 4.9 |
Vector | AV:L/AC:L/Au:N/C:N/I:N/A:C |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Note from the SUSE Security Team on the xen package
This issue likely only affects the XEN hypervisor itself, unless otherwise stated. The userland utilities in -tools and libraries in -libs are shipped together with the xen hypervisor as they are built from one source and do not contain hypervisor specific fixes.SUSE Bugzilla entry: 613485 [RESOLVED / INVALID]
No SUSE Security Announcements cross referenced.
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 17:13:07 2013CVE page last modified: Mon Mar 17 16:17:41 2025