First published: Wed Oct 15 2014(Updated: )
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.17.2 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =12.0 | |
openSUSE Evergreen | =11.4 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Workstation Extension | =12 | |
Red Hat Enterprise Linux | =5.0 | |
Debian GNU/Linux | =7.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Debian | =7.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3690 is considered to have a medium severity level due to its potential to cause denial of service on affected systems.
To fix CVE-2014-3690, update the Linux kernel to version 3.17.2 or later or apply the appropriate patches provided by your distribution.
CVE-2014-3690 affects various versions of the Linux kernel, specifically those prior to 3.17.2 and certain versions of SUSE, Ubuntu, Debian, and Red Hat Enterprise Linux.
CVE-2014-3690 can allow attackers to terminate arbitrary processes or disrupt system operations, leading to a denial of service.
Yes, there are reported exploits that leverage CVE-2014-3690 to compromise host systems running affected versions of the Linux kernel.