** Changed in: linux-lts-quantal (Ubuntu Precise)
       Status: New => Fix Committed

** Changed in: linux-lts-saucy (Ubuntu Precise)
       Status: New => Fix Committed

** Changed in: linux (Ubuntu Precise)
       Status: New => Fix Committed

** Description changed:

- kvm currently mishandles noncanonical addresses when emulating
- instructions that change rip (eg branches, calls), potentially causing a
- failed VM-entry. A guest user with access to I/O or MMIO region can use
- this flaw to crash the guest.
+ arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through
+ 3.17.2 does not properly perform RIP changes, which allows guest OS
+ users to cause a denial of service (guest OS crash) via a crafted
+ application. A guest user with access to I/O or MMIO region can use this
+ flaw to crash the guest.
  
  Break-Fix: - 234f3ce485d54017f15cf5e0699cff4100121601
  Break-Fix: - d1442d85cc30ea75f7d399474ca738e0bc96f715

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545

Title:
  CVE-2014-3647

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to