Your submission was sent successfully! Close

CVE-2014-3645

Published: 10 November 2014

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application. A local unprivileged guest user could use this flaw to crash the guest.

From the Ubuntu security team

A flaw was discovered with invept instruction support when using nested EPT in the KVM (Kernel Virtual Machine). An unprivileged guest user could exploit this flaw to cause a denial of service (system crash) on the guest.

Priority

High

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
Patches:
Introduced by 6aa8b732ca01c3d7a54e93f4d701b8aabbe60fb7
Fixed by bfd0a56b90005f8c8a004baf407ad90045c2b11e
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.12~rc1)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.04 preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support

References

Bugs