6.8
CVSSv2

CVE-2013-1797

Published: 22/03/2013 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.2
VMScore: 606
Vector: AV:A/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel up to and including 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.8.2

linux linux kernel 3.8.0

linux linux kernel

linux linux kernel 3.8.1

linux linux kernel 3.8.3

Vendor Advisories

Synopsis Important: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes several security issues andvarious bugs is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impac ...
Synopsis Important: kvm security update Type/Severity Security Advisory: Important Topic Updated kvm packages that fix three security issues are now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerability Scori ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant secur ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...