{
  "threat_severity" : "Moderate",
  "public_date" : "2011-05-31T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: xen: improper upper boundary check in get_free_port() function",
    "id" : "701240",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=701240"
  },
  "cvss" : {
    "cvss_base_score" : "6.5",
    "cvss_scoring_vector" : "AV:A/AC:H/Au:S/C:C/I:C/A:C",
    "status" : "verified"
  },
  "details" : [ "The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port." ],
  "statement" : "This issue only affects Red Hat Enterprise Linux 5 as we did not backport upstream Xen unstable commit 2dcdd2fcb945. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-05-31T00:00:00Z",
    "advisory" : "RHSA-2011:0833",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-238.12.1.el5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-1763\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-1763" ],
  "name" : "CVE-2011-1763",
  "csaw" : false
}