5.5

CVE-2014-3690

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 3.17.2
NovellSuse Linux Enterprise Desktop Version12.0 Update-
NovellSuse Linux Enterprise Server Version11 Updatesp2 SwEditionltss
NovellSuse Linux Enterprise Server Version12.0 Update-
OpensuseEvergreen Version11.4
SuseLinux Enterprise Real Time Extension Version11 Updatesp3
RedhatEnterprise Linux Version5.0
DebianDebian Linux Version7.0
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version14.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.01% 0.01
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://www.openwall.com/lists/oss-security/2014/10/21/4
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2014/10/29/7
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/70691
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1153322
Patch
Third Party Advisory
Issue Tracking