CVE-2013-0153

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
Severity
UNKNOWN
AV:L/AC:M/Au:N/C:N/I:N/A:C
Atk. Vector
LOCAL
Atk. Complexity
MEDIUM
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
VendorProductVersion
xenxen
4.2.0
xenxen
4.2.1
xenxen
4.1.0
xenxen
4.1.1
xenxen
4.1.2
xenxen
4.1.3
xenxen
4.1.4
xenxen
3.3.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
saucy
Fixed 4.2.0-1ubuntu6
released
raring
Fixed 4.2.0-1ubuntu6
released
quantal
Fixed 4.1.3-3ubuntu1.3
released
precise
Fixed 4.1.2-2ubuntu2.6
released
oneiric
Fixed 4.1.1-2ubuntu4.6
released
lucid
dne
hardy
dne
xen-3.1
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
not-affected
xen-3.2
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
not-affected
xen-3.3
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
ignored
hardy
dne