SB2011081904 - SUSE Linux update for Xen 



SB2011081904 - SUSE Linux update for Xen

Published: August 19, 2011

Security Bulletin ID SB2011081904
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-1898)

The vulnerability allows a remote #AU# to execute arbitrary code.

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."


2) Input validation error (CVE-ID: CVE-2011-1936)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.


Remediation

Install update from vendor's website.