** Description changed: - IA32_VMX_EPT_VPID_CAP MSR is set) guest invocation of invvpid causes vm - exit, which is currently not handled and causes unknown exit error to be - propagated to userspace. A local unprivileged guest user could use this + arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through + 3.17.2 does not have an exit handler for the INVVPID instruction, which + allows guest OS users to cause a denial of service (guest OS crash) via + a crafted application. A local unprivileged guest user could use this flaw to crash the guest. Break-Fix: - a642fc305053cc1c6e47e4f4df327895747ab485
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384544 Title: CVE-2014-3646 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384544/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
