First published: Thu Feb 06 2014(Updated: )
Buffer overflow in the complete_emulated_mmio function in arch/x86/kvm/x86.c in the Linux kernel before 3.13.6 allows guest OS users to execute arbitrary code on the host OS by leveraging a loop that triggers an invalid memory copy affecting certain cancel_work_item data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.13.6 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0049 is classified as a critical vulnerability due to its potential for remote code execution on the host OS.
To fix CVE-2014-0049, upgrade the Linux kernel to version 3.13.6 or later.
CVE-2014-0049 affects Linux kernel versions prior to 3.13.6.
Yes, CVE-2014-0049 can impact cloud services that rely on the vulnerable versions of the Linux kernel.
Systems running affected versions of the Linux kernel, particularly those hosting virtual machines, are at risk from CVE-2014-0049.