arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
13 Feb 2023, 00:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-11-10 11:55
Updated : 2023-12-10 11:31
NVD link : CVE-2014-3690
Mitre link : CVE-2014-3690
CVE.ORG link : CVE-2014-3690
JSON object : View
Products Affected
suse
- linux_enterprise_software_development_kit
- linux_enterprise_workstation_extension
- linux_enterprise_real_time_extension
linux
- linux_kernel
debian
- debian_linux
opensuse
- evergreen
redhat
- enterprise_linux
novell
- suse_linux_enterprise_desktop
- suse_linux_enterprise_server
canonical
- ubuntu_linux
CWE
CWE-400
Uncontrolled Resource Consumption