In kvm_lapic_sync_from_vapic and kvm_lapic_sync_to_vapic there is the potential to corrupt kernel memory if userspace provides vapic_addr address that is at the end of a page. An unprivileged local user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Acknowledgements: Red Hat would like to thank Andrew Honig of Google for reporting this issue
Statement: This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise MRG 2 as they did not provide support for the KVM subsystem.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1801 https://rhn.redhat.com/errata/RHSA-2013-1801.html
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1042090]
kernel-3.12.5-200.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.12.5-302.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0163 https://rhn.redhat.com/errata/RHSA-2014-0163.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only Via RHSA-2014:0284 https://rhn.redhat.com/errata/RHSA-2014-0284.html