Bug 1134834 (CVE-2014-3647)

Summary: VUL-0: CVE-2014-3647: kernel-source: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a craft
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: E-mail List <kernel-maintainers>
Status: RESOLVED DUPLICATE QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P5 - None CC: smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/232567/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Marcus Meissner 2019-05-13 08:59:54 UTC
CVE-2014-3647

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2
does not properly perform RIP changes, which allows guest OS users to cause a
denial of service (guest OS crash) via a crafted application.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3647
Comment 1 Marcus Meissner 2019-05-13 09:01:14 UTC
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=234f3ce485d54017f15cf5e0699cff4100121601

was tracked in bug 899192

*** This bug has been marked as a duplicate of bug 899192 ***