Total vulnerabilities in the database
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | - | 3.17.2 |
opensuse / evergreen | 11.4 | 11.4.x |
suse / linux_enterprise_real_time_extension | 11-sp3 | 11-sp3.x |
novell / suse_linux_enterprise_server | 12.0 | 12.0.x |
novell / suse_linux_enterprise_desktop | 12.0 | 12.0.x |
suse / linux_enterprise_workstation_extension | 12 | 12.x |
suse / linux_enterprise_software_development_kit | 12 | 12.x |
novell / suse_linux_enterprise_server | 11-sp2 | 11-sp2.x |
redhat / enterprise_linux | 5.0 | 5.0.x |
debian / debian_linux | 7.0 | 7.0.x |
canonical / ubuntu_linux | 14.10 | 14.10.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |