[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: Xen security advisory CVE-2011-1898 - VT-d (PCI passthrough) MSI
I wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Xen security advisory CVE-2011-1898 > VT-d (PCI passthrough) MSI trap injection ... > The first patch is intended to reduce the impact from full privilege > escalation to denial of service. > Filename: 00-block-msis-on-trap-vectors > SHA1: 0fcc1914714c228e98b3e84597e06cb5de09003c > SHA256: 998e8d5632ee6ad92f52796fe94923f9c38096c5adf2ca74209a6792436ea1e9 > > The second patch is intended to ensure that when Xen boots with > "iommu=required" it will also insist that interrupt remapping is > supported and enabled. It arranges that booting with that option on > vulnerable hardware will fail, rather than appearing to succeed but > actually being vulnerable to guests. > Filename: intremap05033.patch > SHA1: 1cd26adc5ead0c07b67bf354f03164235d67395c > SHA256: 7f8c7d95d33bbd5c4f25671b380e70020fda1ba6cb50b67e59131fa8e59c1c66 These patches should probably be applied to xen-unstable now. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |