Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2337-1 | xen security update |
EUVD |
EUVD-2011-1896 | Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers." |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T22:46:00.183Z
Reserved: 2011-05-04T00:00:00
Link: CVE-2011-1898
No data.
Status : Deferred
Published: 2011-08-12T18:55:00.870
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-1898
OpenCVE Enrichment
No data.
Debian DSA
EUVD