** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Description changed:
- kvm currently mishandles noncanonical addresses when emulating
- instructions that change rip (eg branches, calls), potentially causing a
- failed VM-entry. A guest user with access to I/O or MMIO region can use
- this flaw to crash the guest.
+ arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through
+ 3.17.2 does not properly perform RIP changes, which allows guest OS
+ users to cause a denial of service (guest OS crash) via a crafted
+ application. A guest user with access to I/O or MMIO region can use this
+ flaw to crash the guest.
Break-Fix: - 234f3ce485d54017f15cf5e0699cff4100121601
Break-Fix: - d1442d85cc30ea75f7d399474ca738e0bc96f715
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384545
Title:
CVE-2014-3647
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384545/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs