Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by “using DMA to generate MSI interrupts by writing to the interrupt injection registers.”
lists.fedoraproject.org/pipermail/package-announce/2011-June/062112.html
lists.fedoraproject.org/pipermail/package-announce/2011-June/062139.html
lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html
lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html
theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html
www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf
xen.1045712.n5.nabble.com/Xen-security-advisory-CVE-2011-1898-VT-d-PCI-passthrough-MSI-td4390298.html
xen.org/download/index_4.0.2.html