CVE-2014-3610 PUBLISHED

The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c. A privileged guest user can use this flaw to crash the host. Enabling CONFIG_PARAVIRT when building the kernel mitigates this issue because wrmsrl() ends up invoking safe msr write variant.

EPSS 0.05% · 15.6th percentile

Risk Scores

EPSS Score
0.05%
15.6th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux0, 3.11.0-12.19, 3.12.0-1.3

Timeline

References

Open in Interactive Console →