CVE-2014-3601

medium

Description

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/95689

https://bugzilla.redhat.com/show_bug.cgi?id=1131951

http://www.ubuntu.com/usn/USN-2359-1

http://www.ubuntu.com/usn/USN-2358-1

http://www.ubuntu.com/usn/USN-2357-1

http://www.ubuntu.com/usn/USN-2356-1

http://www.securityfocus.com/bid/69489

http://secunia.com/advisories/60830

http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html

http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html

http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7

Details

Source: Mitre, NVD

Published: 2014-09-01

Updated: 2023-02-13

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:A/AC:H/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium