First published: Tue Nov 19 2013(Updated: )
In kvm_lapic_sync_from_vapic and kvm_lapic_sync_to_vapic there is the potential to corrupt kernel memory if userspace provides vapic_addr address that is at the end of a page. An unprivileged local user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Acknowledgements: Red Hat would like to thank Andrew Honig of Google for reporting this issue
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1032210 is considered a high severity vulnerability due to its potential to corrupt kernel memory and impact system stability.
To fix REDHAT-BUG-1032210, update your Red Hat Kernel to the latest version provided in Red Hat's errata.
Unprivileged local users on systems running the affected version of the Red Hat Kernel are at risk from REDHAT-BUG-1032210.
If exploited, REDHAT-BUG-1032210 could lead to system crashes or allow unprivileged users to escalate their privileges.
REDHAT-BUG-1032210 was reported on Red Hat's bug tracking system but you can find the exact discovery date in the related vulnerability documentation.