First published: Thu Aug 04 2011(Updated: )
Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=3.3.0 | |
Xen xen-unstable | =3.0.2 | |
Xen xen-unstable | =3.0.3 | |
Xen xen-unstable | =3.0.4 | |
Xen xen-unstable | =3.1.3 | |
Xen xen-unstable | =3.1.4 | |
Xen xen-unstable | =3.2.0 | |
Xen xen-unstable | =3.2.1 | |
Xen xen-unstable | =3.2.2 | |
Xen xen-unstable | =3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2901 has a high severity as it can lead to a denial of service through a host crash.
To fix CVE-2011-2901, upgrade to a version of Xen later than 3.3.0, as the vulnerability is addressed in more recent updates.
CVE-2011-2901 affects Xen versions 3.3.0 and earlier, including specific versions such as 3.0.2, 3.0.3, 3.0.4, 3.1.3, 3.1.4, 3.2.0, 3.2.1, 3.2.2, and 3.2.3.
CVE-2011-2901 can be exploited through unspecified hypercalls that manipulate virtual address bits.
Local 64-bit paravirtual (PV) guest administrators can exploit CVE-2011-2901 to cause a denial of service.