xen is vulnerable to denial of service (DoS). The vulnerability exists as a buffer overflow flaw was found in the Xen hypervisor SCSI subsystem emulation. An unprivileged, local guest user could provide a large number of bytes that are used to zero out a fixed-sized buffer via a SAI READ CAPACITY SCSI command, overwriting memory and causing the guest to crash.
git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
git.qemu.org/?p=qemu-stable-0.15.git;a=log
www.openwall.com/lists/oss-security/2011/10/20/2
www.redhat.com/support/errata/RHSA-2011-1401.html
access.redhat.com/errata/RHSA-2011:1401
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=736038
github.com/bonzini/qemu/commit/103b40f51e4012b3b0ad20f615562a1806d7f49a
github.com/bonzini/qemu/commit/7285477ab11831b1cf56e45878a89170dd06d9b9
rhn.redhat.com/errata/RHSA-2011-1386.html