Skip to navigation

CVE Database

CVE-2011-1763

Impact: Moderate
Public: 2011-05-31
Bugzilla: 701240: CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port() function
IAVA: 2012-A-0020

Details

The MITRE CVE dictionary describes this issue as:

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

Find out more about CVE-2011-1763 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue only affects Red Hat Enterprise Linux 5 as we did not backport upstream Xen unstable commit 2dcdd2fcb945. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected.

CVSS v2 metrics

Base Score: 6.5
Base Metrics: AV:A/AC:H/Au:S/C:C/I:C/A:C
Access Vector: Adjacent Network
Access Complexity: High
Authentication: Single Instance
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (kernel) RHSA-2011:0833 May 31, 2011

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.