First published: Fri Dec 13 2013(Updated: )
Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.2.0 | |
Xen xen-unstable | =4.2.1 | |
Xen xen-unstable | =4.2.2 | |
Xen xen-unstable | =4.2.3 | |
Xen xen-unstable | =4.3.0 | |
Xen xen-unstable | =4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6400 is considered a high severity vulnerability due to its potential to cause denial of service and host crashes.
To fix CVE-2013-6400, you should upgrade to a version of Xen that includes the necessary patches addressing this vulnerability.
CVE-2013-6400 affects Xen versions 4.2.0 through 4.2.3 and 4.3.0 through 4.3.1.
CVE-2013-6400 is a vulnerability related to improper handling of IOMMU TLB flushes that can lead to denial of service.
Yes, local guest administrators can exploit CVE-2013-6400 to cause a denial of service on the host.