SCIENTIFIC-LINUX-ERRATA Archives

February 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Thu, 7 Feb 2013 16:21:30 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (36 lines)
Synopsis:          Moderate: xen security update
Issue Date:        2013-02-07
CVE Numbers:       CVE-2012-4544
--

A flaw was found in the way libxc, the Xen control library, handled 
excessively
large kernel and ramdisk images when starting new guests. A privileged guest
user in a para-virtualized guest (a DomU) could create a crafted kernel or
ramdisk image that, when attempting to use it during guest start, could 
result
in an out-of-memory condition in the privileged domain (the Dom0).
(CVE-2012-4544)

After installing the updated packages, the xend service must be 
restarted for
this update to take effect.
--

SL5
   x86_64
     xen-debuginfo-3.0.3-142.el5_9.1.i386.rpm
     xen-debuginfo-3.0.3-142.el5_9.1.x86_64.rpm
     xen-libs-3.0.3-142.el5_9.1.i386.rpm
     xen-libs-3.0.3-142.el5_9.1.x86_64.rpm
     xen-3.0.3-142.el5_9.1.x86_64.rpm
     xen-devel-3.0.3-142.el5_9.1.i386.rpm
     xen-devel-3.0.3-142.el5_9.1.x86_64.rpm
   i386
     xen-debuginfo-3.0.3-142.el5_9.1.i386.rpm
     xen-libs-3.0.3-142.el5_9.1.i386.rpm
     xen-3.0.3-142.el5_9.1.i386.rpm
     xen-devel-3.0.3-142.el5_9.1.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2