|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for xen RHSA-2012:1130-01|
|Summary:||The remote host is missing an update for the 'xen'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'xen'
package(s) announced via the referenced advisory.
The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
A flaw was found in the way the pyGrub boot loader handled compressed
kernel images. A privileged guest user in a para-virtualized guest (a DomU)
could use this flaw to create a crafted kernel image that, when attempting
to boot it, could result in an out-of-memory condition in the privileged
domain (the Dom0). (CVE-2012-2625)
Red Hat would like to thank Xinli Niu for reporting this issue.
All users of xen are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, the xend service must be restarted for this update to
xen on Red Hat Enterprise Linux (v. 5 server)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-2625|
BugTraq ID: 53650
RedHat Security Advisories: RHSA-2012:1130
SuSE Security Announcement: SUSE-SU-2012:1043 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:1044 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:1135 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1172 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1174 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1572 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1573 (Google Search)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.