Vulnerability Description
The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.0 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Enterprise Linux Eus | 6.2 |
| Canonical | Ubuntu Linux | 10.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://web.archive.org/web/20130329070349/http://ftp.osuosl.org/pub/linux/kernelBroken Link
- http://www.ubuntu.com/usn/USN-1939-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=950490Issue TrackingPatchThird Party Advisory
- https://github.com/torvalds/linux/commit/fa3d315a4ce2c0891cdde262562e710d95fba19PatchThird Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://web.archive.org/web/20130329070349/http://ftp.osuosl.org/pub/linux/kernelBroken Link
- http://www.ubuntu.com/usn/USN-1939-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=950490Issue TrackingPatchThird Party Advisory
- https://github.com/torvalds/linux/commit/fa3d315a4ce2c0891cdde262562e710d95fba19PatchThird Party Advisory
FAQ
What is CVE-2013-1943?
CVE-2013-1943 is a vulnerability with a CVSS score of 7.8 (HIGH). The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local...
How severe is CVE-2013-1943?
CVE-2013-1943 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1943?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Redhat Enterprise Linux Eus, Canonical Ubuntu Linux.