Skip to navigation

CVE Database

CVE-2011-1898

Impact: Important
Public: 2011-04-13
CWE: CWE-284
Bugzilla: 715555: CVE-2011-1898 virt: VT-d (PCI passthrough) MSI trap injection

Details

The MITRE CVE dictionary describes this issue as:

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

Find out more about CVE-2011-1898 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 5.

This issue did affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5. Red Hat cannot backport the fix though as it is too invasive and has a high risk of introducing severe regressions at this point in the Red Hat Enterprise Linux 5 life-cycle. As such, Red Hat recommends that users of KVM on Red Hat Enterprise Linux 5 only use PCI passthrough with trusted guests.

This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 6.

This issue did not affect the versions of kernel-rt package as shipped with Red Hat Enterprise MRG as it did not provide support for virtualization.

For further info please refer to the knowledge base article https://access.redhat.com/knowledge/articles/66747.

CVSS v2 metrics

Base Score: 7.4
Base Metrics: AV:A/AC:M/Au:S/C:C/I:C/A:C
Access Vector: Adjacent Network
Access Complexity: Medium
Authentication: Single Instance
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2012:0358 March 06, 2012
Red Hat Enterprise Linux version 5 (kernel) RHSA-2011:1479 November 29, 2011
Red Hat Enterprise Linux version 6 (kernel) RHSA-2011:1189 August 23, 2011

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.