Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-3690


arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.


Published

2014-11-10T11:55:07.783

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-400

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 3.17.2 Yes
Operating System novell suse_linux_enterprise_desktop 12.0 Yes
Operating System novell suse_linux_enterprise_server 11 Yes
Operating System novell suse_linux_enterprise_server 12.0 Yes
Operating System opensuse evergreen 11.4 Yes
Operating System suse linux_enterprise_real_time_extension 11 Yes
Operating System suse linux_enterprise_software_development_kit 12 Yes
Operating System suse linux_enterprise_workstation_extension 12 Yes
Operating System redhat enterprise_linux 5.0 Yes
Operating System debian debian_linux 7.0 Yes
Operating System canonical ubuntu_linux 12.04 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Operating System canonical ubuntu_linux 14.10 Yes

References