419
VMScore

CVE-2014-3646

Published: 10/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 419
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel up to and including 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux 5.0

canonical ubuntu linux 12.04

debian debian linux 7.0

opensuse evergreen 11.4

suse suse linux enterprise server 11

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 65 Extended Update SupportRed Hat Product Security has rated this update as havin ...
Synopsis Critical: rhev-hypervisor6 security update Type/Severity Security Advisory: Critical Topic An updated rhev-hypervisor6 package that fixes multiple security issues isnow available for Red Hat Enterprise Virtualization 3Red Hat Product Security has rated this update as having Critical securityimpac ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
It was found that the Linux kernel's KVM subsystem did not handle the VM exits gracefully for the invvpid (Invalidate Translations Based on VPID) instructions On hosts with an Intel processor and invppid VM exit support, an unprivileged guest user could use these instructions to crash the guest ...