** Description changed: - Description needed + Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel + through 3.8.4 allows guest OS users to cause a denial of service (host + OS memory corruption) or possibly have unspecified other impact via a + crafted application that triggers use of a guest physical address (GPA) + in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME + kvm_set_msr_common operation. Break-Fix: - 0b79459b482e85cb7426aa7da683a9f2c97aeae1
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1158258 Title: CVE-2013-1797 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1158258/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
