Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1797

Опубликовано: 22 мар. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

РелизСтатусПримечание
devel

not-affected

4.2.0-16.19
esm-infra-legacy/trusty

not-affected

3.11.0-12.19
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life
precise

released

3.2.0-41.66
quantal

released

3.5.0-28.48
raring

not-affected

3.8.0-18.28
saucy

not-affected

3.9.0-0.2
trusty

not-affected

3.11.0-12.19

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

DNE

precise

released

3.2.0-1617.27
quantal

not-affected

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

kvm specific issue
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [kvm specific issue]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

not-affected

kvm specific issue
trusty/esm

DNE

trusty was not-affected [kvm specific issue]
upstream

released

3.9~rc4
utopic

not-affected

kvm specific issue

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-4.23
esm-infra-legacy/trusty

DNE

trusty/esm was ignored [end of life, was needed]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

ignored

end of standard support, was needed
trusty/esm

ignored

end of life, was needed
upstream

released

3.9~rc4
utopic

not-affected

3.4.0-4.20

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [see note]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [see note]
upstream

released

3.9~rc4
utopic

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

DNE

precise

released

3.5.0-28.48~precise1
quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

DNE

precise

not-affected

3.8.0-19.30~precise1
quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.11.0-13.20~precise2
quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.9~rc4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.13.0-24.46~precise1
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.9~rc4
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.16.0-25.33~14.04.2]]
lucid

DNE

precise

DNE

trusty

not-affected

3.16.0-25.33~14.04.2
trusty/esm

DNE

trusty was not-affected [3.16.0-25.33~14.04.2]
upstream

released

3.9~rc4
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.19.0-18.18~14.04.1]]
lucid

DNE

precise

DNE

trusty

not-affected

3.19.0-18.18~14.04.1
trusty/esm

DNE

trusty was not-affected [3.19.0-18.18~14.04.1]
upstream

released

3.9~rc4
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [see note]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [see note]
upstream

released

3.9~rc4
utopic

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

kvm specific issue
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [kvm specific issue]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

kvm specific issue
trusty/esm

DNE

trusty was not-affected [kvm specific issue]
upstream

released

3.9~rc4
utopic

not-affected

kvm specific issue

Показывать по

РелизСтатусПримечание
devel

not-affected

kvm specific issue
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [kvm specific issue]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

kvm specific issue
trusty/esm

DNE

trusty was not-affected [kvm specific issue]
upstream

released

3.9~rc4
utopic

not-affected

kvm specific issue

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

4.2.0-1014.21
esm-infra-legacy/trusty

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.9~rc4
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

released

4.2.0-1014.21
wily

not-affected

4.2.0-1008.12

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

oneiric

not-affected

precise

released

3.2.0-1430.39
quantal

not-affected

raring

not-affected

saucy

not-affected

3.5.0-223.34
trusty

DNE

Показывать по

EPSS

Процентиль: 63%
0.00458
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

nvd
около 12 лет назад

Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

debian
около 12 лет назад

Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel ...

github
около 3 лет назад

Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

oracle-oval
около 12 лет назад

ELSA-2013-0727: kvm security update (IMPORTANT)

EPSS

Процентиль: 63%
0.00458
Низкий

6.8 Medium

CVSS2

Уязвимость CVE-2013-1797