A buffer overflow in Xen might allow remote attacker(s) to execute arbitrary code.
Package | app-emulation/xen on all architectures |
---|---|
Affected versions | < 4.13.1-r3 |
Unaffected versions | >= 4.13.1-r3 |
Package | app-emulation/xen-tools on all architectures |
---|---|
Affected versions | < 4.13.1-r3 |
Unaffected versions | >= 4.13.1-r3 |
Xen is a bare-metal hypervisor.
An out-of-bounds read/write access issue was found in the USB emulator when using QEMU.
A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.
There is no known workaround at this time.
All Xen users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.13.1-r3"
All Xen tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.13.1-r3"
Release date
September 29, 2020
Latest revision
September 29, 2020: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries