** Description changed:

- IA32_VMX_EPT_VPID_CAP MSR is set) guest invocation of invvpid causes vm
- exit, which is currently not handled and causes unknown exit error to be
- propagated to userspace. A local unprivileged guest user could use this
+ arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through
+ 3.17.2 does not have an exit handler for the INVVPID instruction, which
+ allows guest OS users to cause a denial of service (guest OS crash) via
+ a crafted application. A local unprivileged guest user could use this
  flaw to crash the guest.
  
  Break-Fix: - a642fc305053cc1c6e47e4f4df327895747ab485

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384544

Title:
  CVE-2014-3646

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384544/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to