Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1943

Опубликовано: 16 июл. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 7.8

Описание

The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.

РелизСтатусПримечание
devel

not-affected

3.9.0-0.2
esm-infra-legacy/trusty

not-affected

3.11.0-12.19
lucid

released

2.6.32-51.113
precise

not-affected

3.1.0-1.1
quantal

not-affected

3.4.0-1.1
raring

not-affected

3.7.0-0.5
saucy

not-affected

trusty

not-affected

3.11.0-12.19
trusty/esm

not-affected

3.11.0-12.19
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.2.0-1600.1
quantal

not-affected

3.2.0-1602.5
raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

released

2.6.32-356.69
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-1.3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

not-affected

3.4.0-1.3
trusty/esm

DNE

trusty was not-affected [3.4.0-1.3]
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-1.7
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-1.7
trusty/esm

DNE

trusty was not-affected [3.4.0-1.7]
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

3.1.10-8.28
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.1.10-8.28
trusty/esm

DNE

trusty was not-affected [3.1.10-8.28]
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.5.0-18.29~precise1
quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.8.0-19.30~precise1
quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

3.0.0-3.18
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.0.0-3.18
trusty/esm

DNE

trusty was not-affected [3.0.0-3.18]
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-3.21
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-3.21
trusty/esm

DNE

trusty was not-affected [3.4.0-3.21]
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-4.19
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-4.19
trusty/esm

DNE

trusty was not-affected [3.4.0-4.19]
upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
quantal

ignored

end of life
raring

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

3.0.0-1401.2
quantal

not-affected

3.4.0-201.2
raring

not-affected

3.5.0-213.20
saucy

not-affected

trusty

DNE

trusty/esm

DNE

upstream

released

3.0~rc3

Показывать по

EPSS

Процентиль: 32%
0.00124
Низкий

4.4 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

redhat
больше 12 лет назад

The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.

CVSS3: 7.8
nvd
около 12 лет назад

The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.

CVSS3: 7.8
debian
около 12 лет назад

The KVM subsystem in the Linux kernel before 3.0 does not check whethe ...

CVSS3: 7.8
github
больше 3 лет назад

The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.

oracle-oval
больше 12 лет назад

ELSA-2013-0911: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 32%
0.00124
Низкий

4.4 Medium

CVSS2

7.8 High

CVSS3

Уязвимость CVE-2013-1943