The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2013-07-16T10:00:00

Updated: 2024-08-06T15:20:37.331Z

Reserved: 2013-02-19T00:00:00

Link: CVE-2013-1943

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2013-07-16T14:08:50.933

Modified: 2024-11-21T01:50:43.310

Link: CVE-2013-1943

cve-icon Redhat

Severity : Important

Publid Date: 2013-06-10T00:00:00Z

Links: CVE-2013-1943 - Bugzilla