First published: Tue Jan 07 2014(Updated: )
Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =3.2.0 | |
Xen xen-unstable | =3.2.1 | |
Xen xen-unstable | =3.0.4 | |
Xen xen-unstable | =3.4.0 | |
Xen xen-unstable | =3.3.2 | |
Xen xen-unstable | =3.2.2 | |
Xen xen-unstable | =3.4.4 | |
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =3.4.3 | |
Xen xen-unstable | =3.0.3 | |
Xen xen-unstable | <=4.0.1 | |
Xen xen-unstable | =3.2.3 | |
Xen xen-unstable | =3.3.1 | |
Xen xen-unstable | =3.0.2 | |
Xen xen-unstable | =3.4.2 | |
Xen xen-unstable | =3.4.1 | |
Xen xen-unstable | =3.1.4 | |
Xen xen-unstable | =3.3.0 | |
Xen xen-unstable | =3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1166 is classified as a high severity vulnerability due to its potential to cause a denial of service by crashing the host.
To mitigate CVE-2011-1166, upgrade your Xen hypervisor to version 4.0.2 or later, which addresses this vulnerability.
CVE-2011-1166 primarily affects local 64-bit paravirtualized (PV) Xen guests on vulnerable versions of the Xen hypervisor.
While CVE-2011-1166 mainly causes a host crash, it can lead to service disruption that may indirectly result in data loss.
CVE-2011-1166 is not a concern for current Xen deployments using versions after 4.0.2, as the vulnerability has been addressed.