First published: Fri Feb 07 2014(Updated: )
A flaw was found in the way get_rx_bufs() function handled error conditions reported by vhost_get_vq_desc(). A privileged user in the guest could use this flaw to crash the host.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0055 is considered a critical vulnerability as it allows a privileged user in the guest to crash the host.
To fix CVE-2014-0055, upgrade to the recommended versions of the Linux kernel, such as 5.10.223-1, 5.10.226-1, or other specified versions.
CVE-2014-0055 affects Red Hat Enterprise Linux 6.0 and specific versions of the Linux kernel provided by Debian.
CVE-2014-0055 is caused by a flaw in the get_rx_bufs() function's handling of error conditions in the vhost-net subsystem.
Yes, CVE-2014-0055 specifically impacts Red Hat Enterprise Linux and certain versions of Debian's Linux kernel.