Multiple integer overflows in tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0, and 4.1 allow local users to cause a denial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image that triggers (1) a buffer overflow during a decompression loop or (2) an out-of-bounds read in the loader involving unspecified length fields.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00483.html | patch vendor advisory mailing list |
http://rhn.redhat.com/errata/RHSA-2011-0496.html | vendor advisory |
http://lists.xensource.com/archives/html/xen-devel/2011-05/msg00491.html | patch mailing list |