Vulnerability Description
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 3.12.5 |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html
- http://rhn.redhat.com/errata/RHSA-2013-1801.html
- http://rhn.redhat.com/errata/RHSA-2014-0163.html
- http://rhn.redhat.com/errata/RHSA-2014-0284.html
- http://www.openwall.com/lists/oss-security/2013/12/12/12
- http://www.securityfocus.com/bid/64291
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2133-1
- http://www.ubuntu.com/usn/USN-2134-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
FAQ
What is CVE-2013-6368?
CVE-2013-6368 is a vulnerability with a CVSS score of 6.2 (MEDIUM). The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end addres...
How severe is CVE-2013-6368?
CVE-2013-6368 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6368?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux.