VYPR
Unrated severityNVD Advisory· Published Mar 26, 2014· Updated May 6, 2026

CVE-2014-0055

CVE-2014-0055

Description

The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Linux kernel's vhost-net subsystem mishandles error returns in get_rx_bufs(), allowing a guest user to crash the host via a denial of service.

Vulnerability

The flaw resides in the get_rx_bufs() function in drivers/vhost/net.c within the vhost-net subsystem of the Linux kernel [1][2]. The function does not properly handle errors returned by vhost_get_vq_desc(), leaving the code path vulnerable to unexpected states. This issue affects the Linux kernel package for Red Hat Enterprise Linux 6 prior to version 2.6.32-431.11.2.el6 [1]. Red Hat Enterprise Linux 5 and Red Hat MRG 2 are not affected [4].

Exploitation

An attacker requires privileged access within a guest virtual machine (guest OS user) [2][4]. No further authentication or write access is specified. The attacker triggers the vulnerable code path by sending unspecified vectors that cause vhost_get_vq_desc() to return an error, which get_rx_bufs() fails to handle gracefully. The exact sequence of steps is not detailed in the available references, but the result is a crash of the host operating system [2][4].

Impact

Successful exploitation leads to a denial of service (DoS) by crashing the host OS kernel [1][2][4]. This results in a loss of availability for all virtual machines running on the host. No information disclosure, privilege escalation, or remote code execution is described.

Mitigation

The vulnerability is fixed in Red Hat Enterprise Linux 6 by updating the kernel to version 2.6.32-431.11.2.el6 [1]. The fix was released in Red Hat Security Advisory RHSA-2014:0328 on March 26, 2014 [1]. For Fedora, kernel versions 3.13.8-200.fc20 and 3.13.9-100.fc19 contain the fix [4]. No workarounds are documented in the supplied references.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.