Description
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-1821 | Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. |
Ubuntu USN |
USN-1809-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1811-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1812-1 | Linux kernel (Quantal HWE) vulnerabilities |
Ubuntu USN |
USN-1813-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:13:33.006Z
Reserved: 2013-02-19T00:00:00.000Z
Link: CVE-2013-1797
No data.
Status : Modified
Published: 2013-03-22T11:59:11.567
Modified: 2026-04-29T01:13:23.040
Link: CVE-2013-1797
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN