** Description changed:

- Description needed
+ Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel
+ through 3.8.4 allows guest OS users to cause a denial of service (host
+ OS memory corruption) or possibly have unspecified other impact via a
+ crafted application that triggers use of a guest physical address (GPA)
+ in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME
+ kvm_set_msr_common operation.
  
  Break-Fix: - 0b79459b482e85cb7426aa7da683a9f2c97aeae1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1158258

Title:
  CVE-2013-1797

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1158258/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to