Vulnerability Details : CVE-2014-8369
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges. NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2014-8369
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-8369
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8369
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2014-8369
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8369
-
https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
kvm: fix excessive pages un-pinning in kvm_iommu_map error path. · torvalds/linux@3d32e4d · GitHubExploit;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
[security-announce] SUSE-SU-2015:0481-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
[security-announce] openSUSE-SU-2015:0566-1: important: kernel update foMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0674.html
RHSA-2015:0674 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2014/10/24/7
oss-security - CVE-2014-8369 - Linux kernel iommu.c excessive unpinningMailing List;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
[security-announce] SUSE-SU-2015:0736-1: important: Security update forMailing List;Third Party Advisory
-
https://lkml.org/lkml/2014/10/24/460
LKML: Paolo Bonzini: [PATCH 13/14] kvm: fix excessive pages un-pinning in kvm_iommu_map error path.Exploit;Mailing List;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/70747
Linux Kernel KVM 'virt/kvm/iommu.c' Incomplete Fix Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/70749
Linux Kernel KVM CVE-2014-8369 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
kernel/git/torvalds/linux.git - Linux kernel source treeMailing List;Patch;Vendor Advisory
-
http://www.debian.org/security/2014/dsa-3093
Debian -- Security Information -- DSA-3093-1 linuxThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1156518
1156518 – (CVE-2014-8369) CVE-2014-8369 kernel: kvm: excessive pages un-pinning in kvm_iommu_map error pathIssue Tracking;Patch;Third Party Advisory
Jump to