Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3647

Опубликовано: 10 нояб. 2014
Источник: debian
EPSS Низкий

Описание

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.16.7-1package
linux-2.6removedpackage
linux-2.6no-dsasqueezepackage

Примечания

  • https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=234f3ce485d54017f15cf5e0699cff4100121601

  • https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=d1442d85cc30ea75f7d399474ca738e0bc96f715

EPSS

Процентиль: 7%
0.00032
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 10 лет назад

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application. A guest user with access to I/O or MMIO region can use this flaw to crash the guest.

redhat
почти 11 лет назад

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

CVSS3: 5.5
nvd
больше 10 лет назад

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

CVSS3: 5.5
github
около 3 лет назад

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

suse-cvrf
около 10 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 7%
0.00032
Низкий