Rapid7 Vulnerability & Exploit Database

RHSA-2011:0496: xen security update

Back to Search

RHSA-2011:0496: xen security update

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
08/12/2011
Created
07/25/2018
Added
08/12/2011
Modified
07/04/2017

Description

The xen packages contain administration tools and the xend service formanaging the kernel-xen kernel for virtualization on Red Hat EnterpriseLinux.It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decoderoutines did not correctly check for a possible buffer size overflow in thedecoding loop. As well, several integer overflow flaws and missingerror/range checking were found that could lead to an infinite loop. Aprivileged guest user could use these flaws to crash the guest or,possibly, execute arbitrary code in the privileged management domain(Dom0). (CVE-2011-1583)All xen users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.

Solution(s)

  • redhat-upgrade-xen
  • redhat-upgrade-xen-devel
  • redhat-upgrade-xen-libs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;