The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.
2013-07-16T14:08:50.933
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:M/Au:N/C:P/I:P/A:P
3.4
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 3.0 | Yes |
Operating System | redhat | enterprise_linux | 5.0 | Yes |
Operating System | redhat | enterprise_linux_eus | 6.2 | Yes |
Operating System | redhat | enterprise_linux_eus | 6.3 | Yes |
Operating System | canonical | ubuntu_linux | 10.04 | Yes |