CVE-2011-1898
Published: 12 August 2011
Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Notes
Author | Note |
---|---|
kees |
for full-virtualization issues, add qemu (and kvm) |
mdeslaur |
3.x probably not affected, marking as such |
Priority
Status
Package | Release | Status |
---|---|---|
xen
Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Released
(4.1.1)
|
|
Patches:
vendor: http://www.debian.org/security/2011/dsa-2337 |
||
xen-3.1
Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Needs triage
|
|
xen-3.2
Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Needs triage
|
|
xen-3.3
Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
upstream |
Needs triage
|