Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1898

Опубликовано: 13 апр. 2011
Источник: redhat
CVSS2: 7.4

Описание

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

Отчет

This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 5. This issue did affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5. Red Hat cannot backport the fix though as it is too invasive and has a high risk of introducing severe regressions at this point in the Red Hat Enterprise Linux 5 life-cycle. As such, Red Hat recommends that users of KVM on Red Hat Enterprise Linux 5 only use PCI passthrough with trusted guests. This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 6. This issue did not affect the versions of kernel-rt package as shipped with Red Hat Enterprise MRG as it did not provide support for virtualization. For further info please refer to the knowledge base article https://access.redhat.com/knowledge/articles/66747.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmAffected
Red Hat Enterprise Linux Extended Update Support 5.7kernel-xenAffected
Red Hat Enterprise Linux 5kernelFixedRHSA-2011:147929.11.2011
Red Hat Enterprise Linux 5.6 EUS - Server OnlykernelFixedRHSA-2012:035806.03.2012
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:118923.08.2011

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=715555virt: VT-d (PCI passthrough) MSI trap injection

7.4 High

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

nvd
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

debian
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...

github
около 3 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

oracle-oval
больше 13 лет назад

ELSA-2011-1479: kernel security, bug fix, and enhancement update (IMPORTANT)

7.4 High

CVSS2