Description
The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-155-1 | linux-2.6 security update |
EUVD |
EUVD-2014-7977 | The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value. |
Ubuntu USN |
USN-2441-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2442-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-2443-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2445-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2447-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2448-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2464-1 | Linux kernel (OMAP4) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T13:10:51.008Z
Reserved: 2014-10-10T00:00:00.000Z
Link: CVE-2014-8134
No data.
Status : Modified
Published: 2014-12-12T18:59:03.317
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-8134
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN