When a user memory slot is moved (ie. the base_gfn changes), iommu pages are neither unpinned nor unmapped. The memory for these pages then cannot be recovered without rebooting the system. Local user with ability to assign device (with access to PCI sysfs files for a device) could use this flaw to DoS the system. Upstream fixes: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e40f193f5bb022e927a57a4f5d5194e4f12ddb74
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1645 https://rhn.redhat.com/errata/RHSA-2013-1645.html