Rapid7 Vulnerability & Exploit Database

RHSA-2011:1401: xen security and bug fix update

Back to Search

RHSA-2011:1401: xen security and bug fix update

Severity
4
CVSS
(AV:L/AC:H/Au:N/C:N/I:N/A:C)
Published
10/24/2011
Created
07/25/2018
Added
10/27/2011
Modified
07/04/2017

Description

The xen packages contain administration tools and the xend service formanaging the kernel-xen kernel for virtualization on Red Hat EnterpriseLinux.A buffer overflow flaw was found in the Xen hypervisor SCSI subsystememulation. An unprivileged, local guest user could provide a large numberof bytes that are used to zero out a fixed-sized buffer via a SAI READCAPACITY SCSI command, overwriting memory and causing the guest to crash.(CVE-2011-3346)This update also fixes the following bugs:Note: Before a guest is using a new enough kernel (RHSA-2011:1386), the MTUof the VIF will drop back to 1500 (if it was set higher) after migration.All xen users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdated packages, the xend service must be restarted for this update totake effect.

Solution(s)

  • redhat-upgrade-xen
  • redhat-upgrade-xen-devel
  • redhat-upgrade-xen-libs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;