CVE-2013-6375

Xen - Access Control

Title source: rule
STIX 2.1

Description

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."

References (5)

Core 5
Core References
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-201407-03.xml
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/11/21/1
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1029369
Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/11/20/3

Scores

EPSS 0.0063
EPSS Percentile 70.4%

Details

CWE
CWE-264
Status published
Products (6)
opensuse/opensuse 13.1
xen/xen 4.2.1
xen/xen 4.2.2
xen/xen 4.2.3
xen/xen 4.3.0
xen/xen 4.3.1
Published Nov 23, 2013
Tracked Since Feb 18, 2026