arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2014-11-10 03:55
Updated : 2023-02-12 16:42
NVD link : CVE-2014-3690
Mitre link : CVE-2014-3690
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
novell
- suse_linux_enterprise_server
- suse_linux_enterprise_desktop
redhat
- enterprise_linux
debian
- debian_linux
canonical
- ubuntu_linux
suse
- linux_enterprise_software_development_kit
- linux_enterprise_real_time_extension
- linux_enterprise_workstation_extension
opensuse
- evergreen
linux
- linux_kernel