A flaw was found in the way iommu mapping failures were handled in kvm_iommu_map_pages() function in the Linux kernel (introduced by the fix for CVE-2014-3601). A privileged user in the guest could use this flaw to crash the host in case the guest has access to passed in device. Introduced by: http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 Upstream patch: http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
Statement: This issue did not affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 5, 7 and Red Hat Enterprise MRG 2. Future Linux kernel updates for Red Hat Enterprise Linux 6 may address this issue.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1156522]
kernel-3.16.6-203.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.17.2-300.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.14.23-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:0674 https://rhn.redhat.com/errata/RHSA-2015-0674.html