CVE-2011-1763

Impact:
Moderate
Public Date:
2011-05-31
IAVA:
2012-A-0020
Bugzilla:
701240: CVE-2011-1763 kernel: xen: improper upper boundary check in get_free_port() function

The MITRE CVE dictionary describes this issue as:

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

Find out more about CVE-2011-1763 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue only affects Red Hat Enterprise Linux 5 as we did not backport upstream Xen unstable commit 2dcdd2fcb945. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected.

CVSS v2 metrics

Base Score 6.5
Base Metrics AV:A/AC:H/Au:S/C:C/I:C/A:C
Access Vector Adjacent Network
Access Complexity High
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:0833 2011-05-31

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 kernel-xen Affected

Mitigation

Last Modified

CVE description copyright © 2017, The MITRE Corporation