Логотип exploitDog
bind:"CVE-2011-1898"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2011-1898"

Количество 8

Количество 8

ubuntu логотип

CVE-2011-1898

около 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
EPSS: Низкий
redhat логотип

CVE-2011-1898

больше 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
EPSS: Низкий
nvd логотип

CVE-2011-1898

около 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
EPSS: Низкий
debian логотип

CVE-2011-1898

около 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...

CVSS2: 7.4
EPSS: Низкий
github логотип

GHSA-567h-gr95-57mc

больше 3 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

EPSS: Низкий
oracle-oval логотип

ELSA-2011-1479

почти 14 лет назад

ELSA-2011-1479: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2011-2025

около 14 лет назад

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2011-1189

около 14 лет назад

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
1%
Низкий
около 14 лет назад
redhat логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
1%
Низкий
больше 14 лет назад
nvd логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

CVSS2: 7.4
1%
Низкий
около 14 лет назад
debian логотип
CVE-2011-1898

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...

CVSS2: 7.4
1%
Низкий
около 14 лет назад
github логотип
GHSA-567h-gr95-57mc

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

1%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2011-1479

ELSA-2011-1479: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 14 лет назад
oracle-oval логотип
ELSA-2011-2025

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

около 14 лет назад
oracle-oval логотип
ELSA-2011-1189

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)

около 14 лет назад

Уязвимостей на страницу