Description
Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."
References (5)
Core 5
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-201407-03.xml
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/11/21/1
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1029369
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2013/11/20/3
Scores
EPSS
0.0063
EPSS Percentile
70.4%
Details
CWE
CWE-264
Status
published
Products (6)
opensuse/opensuse
13.1
xen/xen
4.2.1
xen/xen
4.2.2
xen/xen
4.2.3
xen/xen
4.3.0
xen/xen
4.3.1
Published
Nov 23, 2013
Tracked Since
Feb 18, 2026