kernel is vulnerable to denial of service. A flaw was found in the way the Xen hypervisor implementation handled instruction emulation during virtual machine exits. A malicious user-space process running in an SMP guest could trick the emulator into reading a different instruction than the one that caused the virtual machine to exit. An unprivileged guest user could trigger this flaw to crash the host. This only affects systems with both an AMD x86 processor and the AMD Virtualization (AMD-V) extensions enabled.
rhn.redhat.com/errata/RHSA-2011-1065.html
rhn.redhat.com/errata/RHSA-2011-1163.html
www.openwall.com/lists/oss-security/2011/07/07/3
access.redhat.com/errata/RHSA-2011:1163
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=702657
rhn.redhat.com/errata/RHSA-2009-1243.html
rhn.redhat.com/errata/RHSA-2011-1065.html