CVE-2013-1935
Publication date 16 July 2013
Last updated 24 July 2024
Ubuntu priority
A certain Red Hat patch to the KVM subsystem in the kernel package before 2.6.32-358.11.1.el6 on Red Hat Enterprise Linux (RHEL) 6 does not properly implement the PV EOI feature, which allows guest OS users to cause a denial of service (host OS crash) by leveraging a time window during which interrupts are disabled but copy_to_user function calls are possible.
From the Ubuntu Security Team
pv_eoi_put_user called by pv_eoi_set_pending in lapic.c can cause a schedule but is called from with preempt_disable() and local_irq_disable() This lets a local attacker cause a schedule while atomic, denial of service. It is hard to exploit.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-linaro-omap | ||
linux-linaro-shared | ||
linux-linaro-vexpress | ||
linux-lts-backport-maverick | ||
linux-lts-quantal | ||
linux-lts-raring | ||
linux-mvl-dove | ||
linux-qcm-msm | ||
linux-ti-omap4 | ||