Логотип exploitDog
bind:"CVE-2011-1898"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2011-1898"

Количество 8

Количество 8

ubuntu логотип

CVE-2011-1898

почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
EPSS: Низкий
redhat логотип

CVE-2011-1898

около 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
EPSS: Низкий
nvd логотип

CVE-2011-1898

почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
EPSS: Низкий
debian логотип

CVE-2011-1898

почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...

CVSS2: 7.4
EPSS: Низкий
github логотип

GHSA-567h-gr95-57mc

около 3 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

EPSS: Низкий
oracle-oval логотип

ELSA-2011-1479

больше 13 лет назад

ELSA-2011-1479: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2011-2025

почти 14 лет назад

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2011-1189

почти 14 лет назад

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
1%
Низкий
почти 14 лет назад
redhat логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
1%
Низкий
около 14 лет назад
nvd логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
1%
Низкий
почти 14 лет назад
debian логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...

CVSS2: 7.4
1%
Низкий
почти 14 лет назад
github логотип
GHSA-567h-gr95-57mc

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

1%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2011-1479

ELSA-2011-1479: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 13 лет назад
oracle-oval логотип
ELSA-2011-2025

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

почти 14 лет назад
oracle-oval логотип
ELSA-2011-1189

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 14 лет назад

Уязвимостей на страницу