SB2012120401 - SUSE Linux update for Xen
Published: December 4, 2012
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2012-5513)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
2) Input validation error (CVE-ID: CVE-2012-5515)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
Remediation
Install update from vendor's website.