** Description changed: - A missing sanity check was found in the kvm_set_memory_region() function - in KVM, allowing a user-space process to register memory regions - pointing to the kernel address space. A local, unprivileged user could - use this flaw to escalate their privileges. + The KVM subsystem in the Linux kernel before 3.0 does not check whether + kernel addresses are specified during allocation of memory slots for use + in a guest's physical address space, which allows local users to gain + privileges or obtain sensitive information from kernel memory via a + crafted application, related to arch/x86/kvm/paging_tmpl.h and + virt/kvm/kvm_main.c. Break-Fix: - fa3d315a4ce2c0891cdde262562e710d95fba19e Break-Fix: - 9e3bb6b6f6a0c535eb053fbf0005a8e79e053374
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1191918 Title: CVE-2013-1943 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1191918/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
