Bug 1134834 (CVE-2014-3647) - VUL-0: CVE-2014-3647: kernel-source: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a craft
Summary: VUL-0: CVE-2014-3647: kernel-source: arch/x86/kvm/emulate.c in the KVM subsys...
Status: RESOLVED DUPLICATE of bug 899192
Alias: CVE-2014-3647
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: E-mail List
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/232567/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-05-13 08:59 UTC by Marcus Meissner
Modified: 2019-05-13 09:01 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2019-05-13 08:59:54 UTC
CVE-2014-3647

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2
does not properly perform RIP changes, which allows guest OS users to cause a
denial of service (guest OS crash) via a crafted application.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3647
Comment 1 Marcus Meissner 2019-05-13 09:01:14 UTC
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=234f3ce485d54017f15cf5e0699cff4100121601

was tracked in bug 899192

*** This bug has been marked as a duplicate of bug 899192 ***