Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-1798

Опубликовано: 20 мар. 2013
Источник: redhat
CVSS2: 5.9
EPSS Низкий

Описание

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

Отчет

This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG as they did not provide support for the KVM subsystem.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 5kvmAffected
Red Hat Enterprise MRG 2realtime-kernelNot affected
Red Hat Enterprise Linux 5kvmFixedRHSA-2013:072709.04.2013
Red Hat Enterprise Linux 6kernelFixedRHSA-2013:074423.04.2013
Red Hat Enterprise Linux 6.2 EUS - Server and Compute Node OnlykernelFixedRHSA-2013:102609.07.2013
Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node OnlykernelFixedRHSA-2013:092811.06.2013
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2013:074623.04.2013

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=917017kernel: kvm: out-of-bounds access in ioapic indirect register reads

EPSS

Процентиль: 56%
0.00332
Низкий

5.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

nvd
больше 12 лет назад

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

debian
больше 12 лет назад

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux ke ...

github
больше 3 лет назад

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

oracle-oval
больше 12 лет назад

ELSA-2013-0727: kvm security update (IMPORTANT)

EPSS

Процентиль: 56%
0.00332
Низкий

5.9 Medium

CVSS2