First published: Sun Aug 02 2020(Updated: )
A stack overflow flaw via an infinite loop condition issue was found in the KVM hypervisor of the Linux kernel. This flaw occurs while processing interrupts because the IRQ state is erroneously set. This flaw allows a guest user to crash the host kernel, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-240.22.1.rt7.77.el8_3 | 0:4.18.0-240.22.1.rt7.77.el8_3 |
redhat/kernel | <0:4.18.0-240.22.1.el8_3 | 0:4.18.0-240.22.1.el8_3 |
Linux Linux kernel | <5.9.2 | |
redhat/Linux | <5.10 | 5.10 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Disabling APICV by setting the kvm_intel.enable_apicv=0 parameter helps to avoid this situation.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.