Your submission was sent successfully! Close

CVE-2014-3601

Published: 31 August 2014

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.

From the Ubuntu security team

Jack Morgenstein reported a flaw in the page handling of the KVM (Kerenl Virtual Machine) subsystem in the Linux kernel. A guest OS user could exploit this flaw to cause a denial of service (host OS memory corruption) or possibly have other unspecified impact on the host OS.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
Patches:
Introduced by

fcd95807fb61e67d602610e7ff7129ed769e9fee

Fixed by 350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
linux-armadaxp
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-ec2
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-flo
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-gke
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-goldfish
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-grouper
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-hwe
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-hwe-edge
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-linaro-omap
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-linaro-shared
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-lts-quantal
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-lts-saucy
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-lts-utopic
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-lts-vivid
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-lts-wily
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-lts-xenial
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-maguro
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-mako
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-manta
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-mvl-dove
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-qcm-msm
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-raspi2
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-snapdragon
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)
linux-ti-omap4
Launchpad, Ubuntu, Debian
upstream
Released (3.17~rc2)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.04 preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support

References