393
VMScore

CVE-2013-1943

Published: 16/07/2013 Updated: 13/02/2023
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 393
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The KVM subsystem in the Linux kernel prior to 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux 5.0

redhat enterprise linux eus 6.3

redhat enterprise linux eus 6.2

canonical ubuntu linux 10.04

Vendor Advisories

Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...