arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
13 Feb 2023, 00:41
Type | Values Removed | Values Added |
---|---|---|
Summary | arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application. | |
References |
|
02 Feb 2023, 20:18
Type | Values Removed | Values Added |
---|---|---|
Summary | A flaw was found in the way the Linux kernel's KVM subsystem handled non-canonical addresses when emulating instructions that change the RIP (for example, branches or calls). A guest user with access to an I/O or MMIO region could use this flaw to crash the guest. | |
References |
|
|
Information
Published : 2014-11-10 11:55
Updated : 2023-12-10 11:31
NVD link : CVE-2014-3647
Mitre link : CVE-2014-3647
CVE.ORG link : CVE-2014-3647
JSON object : View
Products Affected
opensuse
- evergreen
debian
- debian_linux
redhat
- enterprise_linux
suse
- suse_linux_enterprise_server
oracle
- linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE