You are here

T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

July 28, 2011 - 3:47pm

Addthis

PROBLEM:

A vulnerability was reported in Red Hat Enterprise Virtualization Hypervisor. A remote user can cause denial of service conditions.

PLATFORM:

Red Hat Enterprise Virtualization-hypervisor package.

ABSTRACT:

Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

reference LINKS:

RHSA-2011:1090-1
SecurityTracker Alert ID: 1025853
CVE-2011-1576
RHBA-2011:1068-1,Hypervisor is based on KVM - Bug Fix Advisory

IMPACT ASSESSMENT:

Medium

Discussion:

A flaw was found that allowed napi_reuse_skb() to be called on VLAN (virtual LAN) packets. An attacker on the local network could trigger this flaw by sending specially-crafted packets to a target system, possibly causing a denial of service. (CVE-2011-1576)

Red Hat updated package provides updated components that include fixes for security issues; however, these issues have no security impact for Red Hat Enterprise Virtualization Hypervisor.

These fixes are for bash issue CVE-2008-5374; curl issue CVE-2011-2192; kernel issues CVE-2010-4649,
CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573,
CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1780,
CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492, CVE-2011-2525, and
CVE-2011-2689; libvirt issue CVE-2011-2511; and rsync issue CVE-2007-6200.

Impact:

Red Hat Enterprise Virtualization Hypervisor is based on KVM. A remote user can cause denial of service conditions.

Solution:

The vendor has issued a fix. Red Hat Update  'rhev-hypervisor-5.7-20110725.1.el5.noarch.rpm'

 

 

Addthis