The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2013-07-16T10:00:00
Updated: 2024-08-06T15:20:37.331Z
Reserved: 2013-02-19T00:00:00
Link: CVE-2013-1943
Vulnrichment
No data.
NVD
Status : Modified
Published: 2013-07-16T14:08:50.933
Modified: 2024-11-21T01:50:43.310
Link: CVE-2013-1943
Redhat