First published: Sun Sep 21 2014(Updated: )
If the guest writes a noncanonical value to certain MSR registers, KVM will write that value to the MSR in the host context and a #GP will be raised leading to kernel panic. A privileged guest user can use this flaw to crash the host. Enabling CONFIG_PARAVIRT when building the kernel mitigates this issue because wrmsrl() ends up invoking safe msr write variant. Acknowledgements: Red Hat would like to thank Lars Bull of Google and Nadav Amit for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.17.2 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Debian GNU/Linux | =7.0 | |
openSUSE Evergreen | =11.4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <3.17.2 | |
Debian | =7.0 | |
Evergreen ILS | =11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3610 is considered a critical vulnerability that can lead to a kernel panic in the host system.
To fix CVE-2014-3610, you should update to the vulnerable software versions listed in the original documentation.
CVE-2014-3610 affects various versions of the Linux kernel, especially those prior to version 3.17.2.
Exploitation of CVE-2014-3610 allows a privileged guest user to crash the host system.
Enabling CONFIG_PARAVIRT when building the kernel is a mitigation strategy for CVE-2014-3610.