kernel is vulnerable to denial of service (DoS). The vulnerability exists as a flaw was found in the Xen hypervisor implementation when using the Intel Itanium architecture, allowing guests to enter an unsupported state. An unprivileged guest user could trigger this flaw by setting the BE (Big Endian) bit of the Processor Status Register (PSR), leading to the guest crashing (denial of service).
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.5_Technical_Notes/kernel.html#id3512211
osvdb.org/65541
secunia.com/advisories/43315
www.openwall.com/lists/oss-security/2010/06/10/2
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0610.html
www.securityfocus.com/archive/1/516397/100/0/threaded
www.securityfocus.com/bid/40776
www.vmware.com/security/advisories/VMSA-2011-0003.html
xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb
access.redhat.com/errata/RHSA-2010:0610
bugzilla.redhat.com/show_bug.cgi?id=586415
exchange.xforce.ibmcloud.com/vulnerabilities/59373