|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Re: Xen security advisory CVE-2011-1898 - VT-d (PCI passthro
I wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Xen security advisory CVE-2011-1898
> VT-d (PCI passthrough) MSI trap injection
...
> The first patch is intended to reduce the impact from full privilege
> escalation to denial of service.
> Filename: 00-block-msis-on-trap-vectors
> SHA1: 0fcc1914714c228e98b3e84597e06cb5de09003c
> SHA256: 998e8d5632ee6ad92f52796fe94923f9c38096c5adf2ca74209a6792436ea1e9
>
> The second patch is intended to ensure that when Xen boots with
> "iommu=required" it will also insist that interrupt remapping is
> supported and enabled. It arranges that booting with that option on
> vulnerable hardware will fail, rather than appearing to succeed but
> actually being vulnerable to guests.
> Filename: intremap05033.patch
> SHA1: 1cd26adc5ead0c07b67bf354f03164235d67395c
> SHA256: 7f8c7d95d33bbd5c4f25671b380e70020fda1ba6cb50b67e59131fa8e59c1c66
These patches should probably be applied to xen-unstable now.
Ian.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|