MEDIUM · 4.3

CVE-2014-3601

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) c...

Vulnerability Description

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.

CVSS Score

4.3

MEDIUM

AV:A/AC:H/Au:S/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
SuseLinux Enterprise Real Time Extension11.0
OpensuseEvergreen11.4
SuseLinux Enterprise Server11
SuseSuse Linux Enterprise Server11
CanonicalUbuntu Linux12.04
LinuxLinux Kernel<= 3.16.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3601?

CVE-2014-3601 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) c...

How severe is CVE-2014-3601?

CVE-2014-3601 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3601?

Check the references section above for vendor advisories and patch information. Affected products include: Suse Linux Enterprise Real Time Extension, Opensuse Evergreen, Suse Linux Enterprise Server, Suse Suse Linux Enterprise Server, Canonical Ubuntu Linux.