Description
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-3570 | The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages. |
Ubuntu USN |
USN-2356-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2357-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2358-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2359-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T10:50:17.577Z
Reserved: 2014-05-14T00:00:00.000Z
Link: CVE-2014-3601
No data.
Status : Modified
Published: 2014-09-01T01:55:18.250
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-3601
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN