Severity
5.5MEDIUMNVD
EPSS
0.1%
top 72.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateMay 13

Description

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

Debianlinux/linux_kernel< 3.16.7-1+3
Ubuntulinux/linux_kernel< 3.13.0-39.66
NVDlinux/linux_kernel3.17.2

Also affects: Debian Linux 7.0, Ubuntu Linux 12.04, Enterprise Linux 5.0

Patches

🔴Vulnerability Details

7
GHSA
GHSA-xq4c-q7v4-538j: arch/x86/kvm/vmx2022-05-13
GHSA
OpenStack Keystone Logs Passwords2022-05-13
CVEList
CVE-2014-3646: arch/x86/kvm/vmx2014-11-10
OSV
CVE-2014-3646: arch/x86/kvm/vmx2014-11-10
OSV
linux vulnerabilities2014-10-30

📋Vendor Advisories

8
Red Hat
openstack-keystone: cache backend password leak in log (OSSA 2015-008)2015-05-04
Ubuntu
Linux kernel vulnerabilities2014-11-25
Ubuntu
Linux kernel (OMAP4) vulnerabilities2014-11-25
Ubuntu
Linux kernel vulnerabilities2014-10-31
Ubuntu
Linux kernel vulnerabilities2014-10-30

💬Community

2
Bugzilla
CVE-2014-3646 kernel: kvm: vmx: invvpid vm exit not handled [fedora-all]2014-10-24
Bugzilla
CVE-2014-3646 kernel: kvm: vmx: invvpid vm exit not handled2014-09-21
CVE-2014-3646 — Uncaught Exception in Linux Kernel | cvebase