The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/04/07/2 | Mailing List Patch Third Party Advisory |
http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60 | Exploit Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1081589 | Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2014-04-14 16:55
Updated : 2023-02-12 16:34
NVD link : CVE-2014-0155
Mitre link : CVE-2014-0155
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
linux
- linux_kernel