ID CVE-2011-2901
Summary Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.
References
Vulnerable Configurations
  • cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
  • cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
CVSS
Base: 5.5 (as of 31-12-2013 - 04:09)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:A/AC:L/Au:S/C:N/I:N/A:C
redhat via4
advisories
bugzilla
id 728042
title CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()
oval
AND
  • comment Red Hat Enterprise Linux 5 is installed
    oval oval:com.redhat.rhba:tst:20070331001
  • OR
    • AND
      • comment kernel is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212002
      • comment kernel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314003
    • AND
      • comment kernel-PAE is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212022
      • comment kernel-PAE is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314021
    • AND
      • comment kernel-PAE-devel is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212020
      • comment kernel-PAE-devel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314023
    • AND
      • comment kernel-debug is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212012
      • comment kernel-debug is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314015
    • AND
      • comment kernel-debug-devel is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212014
      • comment kernel-debug-devel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314009
    • AND
      • comment kernel-devel is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212006
      • comment kernel-devel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314007
    • AND
      • comment kernel-doc is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212024
      • comment kernel-doc is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314025
    • AND
      • comment kernel-headers is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212004
      • comment kernel-headers is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314005
    • AND
      • comment kernel-kdump is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212016
      • comment kernel-kdump is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314017
    • AND
      • comment kernel-kdump-devel is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212018
      • comment kernel-kdump-devel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314019
    • AND
      • comment kernel-xen is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212010
      • comment kernel-xen is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314011
    • AND
      • comment kernel-xen-devel is earlier than 0:2.6.18-274.3.1.el5
        oval oval:com.redhat.rhsa:tst:20111212008
      • comment kernel-xen-devel is signed with Red Hat redhatrelease key
        oval oval:com.redhat.rhba:tst:20080314013
rhsa
id RHSA-2011:1212
released 2011-09-06
severity Important
title RHSA-2011:1212: kernel security and bug fix update (Important)
rpms
  • kernel-0:2.6.18-274.3.1.el5
  • kernel-PAE-0:2.6.18-274.3.1.el5
  • kernel-PAE-devel-0:2.6.18-274.3.1.el5
  • kernel-debug-0:2.6.18-274.3.1.el5
  • kernel-debug-devel-0:2.6.18-274.3.1.el5
  • kernel-devel-0:2.6.18-274.3.1.el5
  • kernel-doc-0:2.6.18-274.3.1.el5
  • kernel-headers-0:2.6.18-274.3.1.el5
  • kernel-kdump-0:2.6.18-274.3.1.el5
  • kernel-kdump-devel-0:2.6.18-274.3.1.el5
  • kernel-xen-0:2.6.18-274.3.1.el5
  • kernel-xen-devel-0:2.6.18-274.3.1.el5
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=728042
gentoo GLSA-201309-24
mlist [oss-security] 20110902 Xen Security Advisory 4 (CVE-2011-2901) - Xen 3.3 vaddr validation
secunia 55082
Last major update 31-12-2013 - 04:09
Published 01-10-2013 - 17:55
Back to Top