First published: Wed Oct 15 2014(Updated: )
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.1 ...
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.17.2 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =12.0 | |
Evergreen ILS | =11.4 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Workstation Extension | =12 | |
Red Hat Enterprise Linux | =5.0 | |
Debian Linux | =7.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3690 is considered to have a medium severity level due to its potential to cause denial of service on affected systems.
To fix CVE-2014-3690, update the Linux kernel to version 3.17.2 or later or apply the appropriate patches provided by your distribution.
CVE-2014-3690 affects various versions of the Linux kernel, specifically those prior to 3.17.2 and certain versions of SUSE, Ubuntu, Debian, and Red Hat Enterprise Linux.
CVE-2014-3690 can allow attackers to terminate arbitrary processes or disrupt system operations, leading to a denial of service.
Yes, there are reported exploits that leverage CVE-2014-3690 to compromise host systems running affected versions of the Linux kernel.