5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.001 Low
EPSS
Percentile
31.6%
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for
the standard Red Hat Enterprise Linux kernel.
It was found that KVM’s Write to Model Specific Register (WRMSR)
instruction emulation would write non-canonical values passed in by the
guest to certain MSRs in the host’s context. A privileged guest user could
use this flaw to crash the host. (CVE-2014-3610)
A race condition flaw was found in the way the Linux kernel’s KVM subsystem
handled PIT (Programmable Interval Timer) emulation. A guest user who has
access to the PIT I/O ports could use this flaw to crash the host.
(CVE-2014-3611)
Red Hat would like to thank Lars Bull of Google and Nadav Amit for
reporting the CVE-2014-3610 issue, and Lars Bull of Google for reporting
the CVE-2014-3611 issue.
All kvm users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. Note: The procedure in
the Solution section must be performed before this update will take effect.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | x86_64 | kvm | < 83-270.el5_11 | kvm-83-270.el5_11.x86_64.rpm |
RedHat | 5 | x86_64 | kmod-kvm | < 83-270.el5_11 | kmod-kvm-83-270.el5_11.x86_64.rpm |
RedHat | 5 | x86_64 | kvm-debuginfo | < 83-270.el5_11 | kvm-debuginfo-83-270.el5_11.x86_64.rpm |
RedHat | 5 | x86_64 | kvm-tools | < 83-270.el5_11 | kvm-tools-83-270.el5_11.x86_64.rpm |
RedHat | 5 | x86_64 | kmod-kvm-debug | < 83-270.el5_11 | kmod-kvm-debug-83-270.el5_11.x86_64.rpm |
RedHat | 5 | x86_64 | kvm-qemu-img | < 83-270.el5_11 | kvm-qemu-img-83-270.el5_11.x86_64.rpm |
RedHat | 5 | src | kvm | < 83-270.el5_11 | kvm-83-270.el5_11.src.rpm |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.001 Low
EPSS
Percentile
31.6%