Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: xen on SL5.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Thursday 7th February 2013 22:21:30 UTC (over 3 years ago)
Synopsis:          Moderate: xen security update
Issue Date:        2013-02-07
CVE Numbers:       CVE-2012-4544
--

A flaw was found in the way libxc, the Xen control library, handled 
excessively
large kernel and ramdisk images when starting new guests. A privileged
guest
user in a para-virtualized guest (a DomU) could create a crafted kernel or
ramdisk image that, when attempting to use it during guest start, could 
result
in an out-of-memory condition in the privileged domain (the Dom0).
(CVE-2012-4544)

After installing the updated packages, the xend service must be 
restarted for
this update to take effect.
--

SL5
   x86_64
     xen-debuginfo-3.0.3-142.el5_9.1.i386.rpm
     xen-debuginfo-3.0.3-142.el5_9.1.x86_64.rpm
     xen-libs-3.0.3-142.el5_9.1.i386.rpm
     xen-libs-3.0.3-142.el5_9.1.x86_64.rpm
     xen-3.0.3-142.el5_9.1.x86_64.rpm
     xen-devel-3.0.3-142.el5_9.1.i386.rpm
     xen-devel-3.0.3-142.el5_9.1.x86_64.rpm
   i386
     xen-debuginfo-3.0.3-142.el5_9.1.i386.rpm
     xen-libs-3.0.3-142.el5_9.1.i386.rpm
     xen-3.0.3-142.el5_9.1.i386.rpm
     xen-devel-3.0.3-142.el5_9.1.i386.rpm

- Scientific Linux Development Team
 
CD: 3ms