First published: Sun Sep 21 2014(Updated: )
On systems with invept instruction support (corresponding bit in IA32_VMX_EPT_VPID_CAP MSR is set) guest invocation of invept causes vm exit, which is currently not handled and causes unknown exit error to be propagated to userspace. A local unprivileged guest user could use this flaw to crash the guest. Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bfd0a56b90005f8c8a004baf407ad90045c2b11e">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bfd0a56b90005f8c8a004baf407ad90045c2b11e</a> Acknowledgements: Red Hat would like to thank the Advanced Threat Research team at Intel Security for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1144835 is categorized as high due to the potential for a local unprivileged guest user to crash the system.
To fix REDHAT-BUG-1144835, you should update your Red Hat Linux Kernel to the latest version that addresses this issue.
Systems that support the invept instruction and have the corresponding bit in IA32_VMX_EPT_VPID_CAP MSR set are affected by REDHAT-BUG-1144835.
While REDHAT-BUG-1144835 primarily causes a system crash, it could potentially lead to data loss if unsaved work is present.
No, REDHAT-BUG-1144835 requires local access by an unprivileged guest user to exploit the vulnerability.