This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 5.
This issue did affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5. Red Hat cannot backport the fix though as it is too invasive and has a high risk of introducing severe regressions at this point in the Red Hat Enterprise Linux 5 life-cycle. As such, Red Hat recommends that users of KVM on Red Hat Enterprise Linux 5 only use PCI passthrough with trusted guests.
This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 6.
This issue did not affect the versions of kernel-rt package as shipped with Red Hat Enterprise MRG as it did not provide support for virtualization.
For further info please refer to the knowledge base article https://access.redhat.com/knowledge/articles/66747.
CVSS v2 metrics
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
|Access Vector||Adjacent Network|
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
|Red Hat Enterprise Linux 6 (kernel)||RHSA-2011:1189||2011-08-23|
|Red Hat Enterprise Linux 5 (kernel)||RHSA-2011:1479||2011-11-29|
|Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel)||RHSA-2012:0358||2012-03-06|
Affected Packages State
|Red Hat Enterprise Linux 5||kernel-xen||Affected|
|Red Hat Enterprise Linux Extended Update Support 5.7||kernel-xen||Affected|
|Red Hat Enterprise Linux 5||kvm||Affected|