6.8 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:H/Au:N/C:C/I:C/A:C
0.003 Low
EPSS
Percentile
65.8%
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel
through 3.8.4 allows guest OS users to cause a denial of service (host OS
memory corruption) or possibly have unspecified other impact via a crafted
application that triggers use of a guest physical address (GPA) in (1)
movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME
kvm_set_msr_common operation.
Author | Note |
---|---|
jdstrand | ignored on phablet kernels (too intrusive to backport and they don’t support KVM) |
www.openwall.com/lists/oss-security/2013/03/20/9
launchpad.net/bugs/cve/CVE-2013-1797
nvd.nist.gov/vuln/detail/CVE-2013-1797
security-tracker.debian.org/tracker/CVE-2013-1797
ubuntu.com/security/notices/USN-1809-1
ubuntu.com/security/notices/USN-1811-1
ubuntu.com/security/notices/USN-1812-1
ubuntu.com/security/notices/USN-1813-1
www.cve.org/CVERecord?id=CVE-2013-1797