4.9
CVSSv2

CVE-2014-7842

Published: 30/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 437
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Race condition in arch/x86/kvm/x86.c in the Linux kernel prior to 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.0.25

linux linux kernel 3.15.8

linux linux kernel 3.1.2

linux linux kernel 3.10.8

linux linux kernel 3.15.1

linux linux kernel 3.0

linux linux kernel 3.0.22

linux linux kernel 3.12

linux linux kernel 3.0.5

linux linux kernel 3.0.68

linux linux kernel 3.14

linux linux kernel 3.13.1

linux linux kernel 3.0.38

linux linux kernel 3.13.10

linux linux kernel 3.1

linux linux kernel 3.0.63

linux linux kernel 3.0.46

linux linux kernel 3.10.24

linux linux kernel 3.13.11

linux linux kernel 3.0.47

linux linux kernel 3.0.48

linux linux kernel 3.15.3

linux linux kernel 3.0.18

linux linux kernel 3.14.3

linux linux kernel 3.11.8

linux linux kernel 3.15.6

linux linux kernel 3.0.6

linux linux kernel 3.14.1

linux linux kernel 3.0.36

linux linux kernel 3.0.35

linux linux kernel 3.10.6

linux linux kernel 3.0.11

linux linux kernel 3.17.2

linux linux kernel 3.12.14

linux linux kernel 3.0.58

linux linux kernel 3.0.34

linux linux kernel 3.15.4

linux linux kernel 3.10.1

linux linux kernel 3.10.7

linux linux kernel 3.11.10

linux linux kernel 3.13.6

linux linux kernel 3.0.32

linux linux kernel 3.13.4

linux linux kernel 3.2

linux linux kernel 3.0.52

linux linux kernel 3.0.51

linux linux kernel 3.11.1

linux linux kernel 3.10.15

linux linux kernel 3.12.15

linux linux kernel 3.0.57

linux linux kernel 3.11

linux linux kernel 3.13

linux linux kernel 3.0.19

linux linux kernel 3.0.37

linux linux kernel 3.0.4

linux linux kernel 3.0.27

linux linux kernel

linux linux kernel 3.11.9

linux linux kernel 3.10.26

linux linux kernel 3.10

linux linux kernel 3.10.5

linux linux kernel 3.12.6

linux linux kernel 3.0.42

linux linux kernel 3.0.23

linux linux kernel 3.0.62

linux linux kernel 3.16.0

linux linux kernel 3.0.49

linux linux kernel 3.10.20

linux linux kernel 3.0.8

linux linux kernel 3.10.9

linux linux kernel 3.10.2

linux linux kernel 3.13.3

linux linux kernel 3.13.2

linux linux kernel 3.10.10

linux linux kernel 3.13.5

linux linux kernel 3.10.18

linux linux kernel 3.13.9

linux linux kernel 3.0.64

linux linux kernel 3.0.40

linux linux kernel 3.0.33

linux linux kernel 3.12.7

linux linux kernel 3.0.28

linux linux kernel 3.10.29

linux linux kernel 3.14.2

linux linux kernel 3.11.4

linux linux kernel 3.14.4

linux linux kernel 3.12.8

linux linux kernel 3.10.12

linux linux kernel 3.0.54

linux linux kernel 3.10.19

linux linux kernel 3.10.28

linux linux kernel 3.0.13

linux linux kernel 3.0.55

linux linux kernel 3.17

linux linux kernel 3.0.10

linux linux kernel 3.10.16

linux linux kernel 3.0.1

linux linux kernel 3.1.6

linux linux kernel 3.12.4

linux linux kernel 3.12.12

linux linux kernel 3.11.7

linux linux kernel 3.12.5

linux linux kernel 3.11.3

linux linux kernel 3.10.4

linux linux kernel 3.0.17

linux linux kernel 3.1.3

linux linux kernel 3.16.1

linux linux kernel 3.10.3

linux linux kernel 3.10.23

linux linux kernel 3.1.9

linux linux kernel 3.0.44

linux linux kernel 3.12.17

linux linux kernel 3.0.16

linux linux kernel 3.0.21

linux linux kernel 3.0.7

linux linux kernel 3.0.61

linux linux kernel 3.11.6

linux linux kernel 3.17.1

linux linux kernel 3.1.5

linux linux kernel 3.1.8

linux linux kernel 3.12.3

linux linux kernel 3.10.13

linux linux kernel 3.0.20

linux linux kernel 3.12.1

linux linux kernel 3.0.24

linux linux kernel 3.0.15

linux linux kernel 3.0.45

linux linux kernel 3.0.39

linux linux kernel 3.12.16

linux linux kernel 3.10.0

linux linux kernel 3.0.2

linux linux kernel 3.10.22

linux linux kernel 3.0.67

linux linux kernel 3.12.11

linux linux kernel 3.0.59

linux linux kernel 3.12.9

linux linux kernel 3.12.10

linux linux kernel 3.15.7

linux linux kernel 3.11.2

linux linux kernel 3.0.60

linux linux kernel 3.1.7

linux linux kernel 3.1.1

linux linux kernel 3.15.2

linux linux kernel 3.0.56

linux linux kernel 3.15

linux linux kernel 3.12.2

linux linux kernel 3.0.12

linux linux kernel 3.10.17

linux linux kernel 3.10.11

linux linux kernel 3.15.5

linux linux kernel 3.13.8

linux linux kernel 3.1.10

linux linux kernel 3.10.27

linux linux kernel 3.10.21

linux linux kernel 3.0.66

linux linux kernel 3.12.13

linux linux kernel 3.0.3

linux linux kernel 3.14.5

linux linux kernel 3.0.65

linux linux kernel 3.0.53

linux linux kernel 3.0.9

linux linux kernel 3.0.26

linux linux kernel 3.1.4

linux linux kernel 3.0.43

linux linux kernel 3.0.30

linux linux kernel 3.0.31

linux linux kernel 3.0.29

linux linux kernel 3.0.50

linux linux kernel 3.0.14

linux linux kernel 3.11.5

linux linux kernel 3.10.25

linux linux kernel 3.0.41

linux linux kernel 3.10.14

linux linux kernel 3.13.7

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues, address severalhundred bugs, and add numerous enhancements are now available as part ofthe ongoing support and maintenance of Red H ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
It was found that reporting emulation failures to user space could lead to either a local (CVE-2014-7842) or a L2->L1 (CVE-2010-5313) denial of service In the case of a local denial of service, an attacker must have access to the MMIO area or be able to access an I/O port Please note that on certain systems, HPET is mapped to userspace as part ...