SB2011081904 - SUSE Linux update for Xen
Published: August 19, 2011
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-1898)
The vulnerability allows a remote #AU# to execute arbitrary code.
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
2) Input validation error (CVE-ID: CVE-2011-1936)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
Remediation
Install update from vendor's website.