CVE-2013-0153
kernel: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
El soporte de Xen para AMD IOMMU en v4.2.x, v4.1.x, v3.3, and otras versiones, cuando usa AMD-Vi para el paso por el PCI, usa la misma tabla para el trazado de interrupciones por el host y los anfitriones, lo que permite a los invitados causar una denegación de servicio por medio de la inyección de una interrupción en los otros invitados.
The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Xen hypervisor AMD IOMMU driver handled interrupt remapping entries. By default, a single interrupt remapping table is used, and old interrupt remapping entries are not cleared, potentially allowing a privileged guest user in a guest that has a passed-through, bus-mastering capable PCI device to inject interrupt entries into others guests, including the privileged management domain, leading to a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-12-06 CVE Reserved
- 2013-02-14 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://osvdb.org/89867 | Vdb Entry | |
http://secunia.com/advisories/55082 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2013/02/05/7 | Mailing List |
|
http://www.securityfocus.com/bid/57745 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/81831 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.2.0 Search vendor "Xen" for product "Xen" and version "4.2.0" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.2.1 Search vendor "Xen" for product "Xen" and version "4.2.1" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.1.0 Search vendor "Xen" for product "Xen" and version "4.1.0" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.1.1 Search vendor "Xen" for product "Xen" and version "4.1.1" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.1.2 Search vendor "Xen" for product "Xen" and version "4.1.2" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.1.3 Search vendor "Xen" for product "Xen" and version "4.1.3" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 4.1.4 Search vendor "Xen" for product "Xen" and version "4.1.4" | - |
Affected
| ||||||
Xen Search vendor "Xen" | Xen Search vendor "Xen" for product "Xen" | 3.3.0 Search vendor "Xen" for product "Xen" and version "3.3.0" | - |
Affected
|