CVE-2014-0055
Description
The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Linux kernel's vhost-net subsystem mishandles error returns in get_rx_bufs(), allowing a guest user to crash the host via a denial of service.
Vulnerability
The flaw resides in the get_rx_bufs() function in drivers/vhost/net.c within the vhost-net subsystem of the Linux kernel [1][2]. The function does not properly handle errors returned by vhost_get_vq_desc(), leaving the code path vulnerable to unexpected states. This issue affects the Linux kernel package for Red Hat Enterprise Linux 6 prior to version 2.6.32-431.11.2.el6 [1]. Red Hat Enterprise Linux 5 and Red Hat MRG 2 are not affected [4].
Exploitation
An attacker requires privileged access within a guest virtual machine (guest OS user) [2][4]. No further authentication or write access is specified. The attacker triggers the vulnerable code path by sending unspecified vectors that cause vhost_get_vq_desc() to return an error, which get_rx_bufs() fails to handle gracefully. The exact sequence of steps is not detailed in the available references, but the result is a crash of the host operating system [2][4].
Impact
Successful exploitation leads to a denial of service (DoS) by crashing the host OS kernel [1][2][4]. This results in a loss of availability for all virtual machines running on the host. No information disclosure, privilege escalation, or remote code execution is described.
Mitigation
The vulnerability is fixed in Red Hat Enterprise Linux 6 by updating the kernel to version 2.6.32-431.11.2.el6 [1]. The fix was released in Red Hat Security Advisory RHSA-2014:0328 on March 26, 2014 [1]. For Fedora, kernel versions 3.13.8-200.fc20 and 3.13.9-100.fc19 contain the fix [4]. No workarounds are documented in the supplied references.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- Range: <2.6.32-431.11.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.