** Description changed:

- A missing sanity check was found in the kvm_set_memory_region() function
- in KVM, allowing a user-space process to register memory regions
- pointing to the kernel address space. A local, unprivileged user could
- use this flaw to escalate their privileges.
+ The KVM subsystem in the Linux kernel before 3.0 does not check whether
+ kernel addresses are specified during allocation of memory slots for use
+ in a guest's physical address space, which allows local users to gain
+ privileges or obtain sensitive information from kernel memory via a
+ crafted application, related to arch/x86/kvm/paging_tmpl.h and
+ virt/kvm/kvm_main.c.
  
  Break-Fix: - fa3d315a4ce2c0891cdde262562e710d95fba19e
  Break-Fix: - 9e3bb6b6f6a0c535eb053fbf0005a8e79e053374

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1191918

Title:
  CVE-2013-1943

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1191918/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to