{
  "threat_severity" : "Important",
  "public_date" : "2011-04-13T00:00:00Z",
  "bugzilla" : {
    "description" : "virt: VT-d (PCI passthrough) MSI trap injection",
    "id" : "715555",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=715555"
  },
  "cvss" : {
    "cvss_base_score" : "7.4",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:S/C:C/I:C/A:C",
    "status" : "verified"
  },
  "cwe" : "CWE-284",
  "details" : [ "Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by \"using DMA to generate MSI interrupts by writing to the interrupt injection registers.\"" ],
  "statement" : "This issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 5.\nThis issue did affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5. Red Hat cannot backport the fix though as it is too invasive and has a high risk of introducing severe regressions at this point in the Red Hat Enterprise Linux 5 life-cycle. As such, Red Hat recommends that users of KVM on Red Hat Enterprise Linux 5 only use PCI passthrough with trusted guests. \nThis issue did affect the versions of kernel package as shipped with Red Hat Enterprise Linux 6.\nThis issue did not affect the versions of kernel-rt package as shipped with Red Hat Enterprise MRG as it did not provide support for virtualization.\nFor further info please refer to the knowledge base article https://access.redhat.com/knowledge/articles/66747.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2011-11-29T00:00:00Z",
    "advisory" : "RHSA-2011:1479",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-274.12.1.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.6 EUS - Server Only",
    "release_date" : "2012-03-06T00:00:00Z",
    "advisory" : "RHSA-2012:0358",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.6",
    "package" : "kernel-0:2.6.18-238.35.1.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2011-08-23T00:00:00Z",
    "advisory" : "RHSA-2011:1189",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-131.12.1.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Affected",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 5.7",
    "fix_state" : "Affected",
    "package_name" : "kernel-xen",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-1898\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-1898" ],
  "name" : "CVE-2011-1898",
  "csaw" : false
}