SB2012120401 - SUSE Linux update for Xen



SB2012120401 - SUSE Linux update for Xen

Published: December 4, 2012

Security Bulletin ID SB2012120401
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2012-5513)

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.


2) Input validation error (CVE-ID: CVE-2012-5515)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.


Remediation

Install update from vendor's website.