Lucene search

K
osvGoogleOSV:DSA-2337-1
HistoryNov 06, 2011 - 12:00 a.m.

xen - several vulnerabilities

2011-11-0600:00:00
Google
osv.dev
8

7.4 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C

Several vulnerabilities were discovered in the Xen virtual machine
hypervisor.

  • CVE-2011-1166
    A 64-bit guest can get one of its vCPUs into non-kernel
    mode without first providing a valid non-kernel pagetable,
    thereby locking up the host system.
  • CVE-2011-1583, CVE-2011-3262
    Local users can cause a denial of service and possibly execute
    arbitrary code via a crafted paravirtualised guest kernel image.
  • CVE-2011-1898
    When using PCI passthrough on Intel VT-d chipsets that do not
    have interrupt remapping, guest OS users can gain host OS
    privileges by writing to the interrupt injection registers.

The oldstable distribution (lenny) contains a different version of Xen
not affected by these problems.

For the stable distribution (squeeze), this problem has been fixed in
version 4.0.1-4.

For the testing (wheezy) and unstable distribution (sid), this problem
has been fixed in version 4.1.1-1.

We recommend that you upgrade your xen packages.

CPENameOperatorVersion
xeneq4.0.1-2

7.4 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C