CVE-2013-0153

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-02-14 22:55

Updated : 2024-02-28 12:00


NVD link : CVE-2013-0153

Mitre link : CVE-2013-0153

CVE.ORG link : CVE-2013-0153


JSON object : View

Products Affected

xen

  • xen