| From: |
| Pat Riehecky <riehecky@fnal.gov> |
| To: |
| "SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV"
<SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV> |
| Subject: |
| Security ERRATA Moderate: xen on SL5.x i386/x86_64 |
| Date: |
| Thu, 7 Feb 2013 16:21:30 -0600 |
| Message-ID: |
| <511428EA.6040002@fnal.gov> |
| Archive-link: |
| Article, Thread
|
Synopsis: Moderate: xen security update
Issue Date: 2013-02-07
CVE Numbers: CVE-2012-4544
--
A flaw was found in the way libxc, the Xen control library, handled
excessively
large kernel and ramdisk images when starting new guests. A privileged guest
user in a para-virtualized guest (a DomU) could create a crafted kernel or
ramdisk image that, when attempting to use it during guest start, could
result
in an out-of-memory condition in the privileged domain (the Dom0).
(CVE-2012-4544)
After installing the updated packages, the xend service must be
restarted for
this update to take effect.
--
SL5
x86_64
xen-debuginfo-3.0.3-142.el5_9.1.i386.rpm
xen-debuginfo-3.0.3-142.el5_9.1.x86_64.rpm
xen-libs-3.0.3-142.el5_9.1.i386.rpm
xen-libs-3.0.3-142.el5_9.1.x86_64.rpm
xen-3.0.3-142.el5_9.1.x86_64.rpm
xen-devel-3.0.3-142.el5_9.1.i386.rpm
xen-devel-3.0.3-142.el5_9.1.x86_64.rpm
i386
xen-debuginfo-3.0.3-142.el5_9.1.i386.rpm
xen-libs-3.0.3-142.el5_9.1.i386.rpm
xen-3.0.3-142.el5_9.1.i386.rpm
xen-devel-3.0.3-142.el5_9.1.i386.rpm
- Scientific Linux Development Team
(
Log in to post comments)