First published: Thu Dec 13 2012(Updated: )
Xen 4.1.1 and earlier allows local guest OS kernels with control of a PCI[E] device to cause a denial of service (CPU consumption and host hang) via many crafted DMA requests that are denied by the IOMMU, which triggers a livelock.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3131 is classified as a denial of service vulnerability that can lead to CPU consumption and host system hang.
To mitigate CVE-2011-3131, upgrade to Xen version 4.1.2 or later.
CVE-2011-3131 affects local guest OS kernels running on Xen 4.1.1 and earlier with control of a PCI[E] device.
No, CVE-2011-3131 requires local access to the guest OS to exploit the vulnerability.
Exploitation of CVE-2011-3131 can cause a denial of service leading to excessive CPU utilization and potential host hang.