First published: Sun Aug 02 2020(Updated: )
A stack overflow flaw via an infinite loop condition issue was found in the KVM hypervisor of the Linux kernel. This flaw occurs while processing interrupts because the IRQ state is erroneously set. This flaw allows a guest user to crash the host kernel, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-240.22.1.rt7.77.el8_3 | 0:4.18.0-240.22.1.rt7.77.el8_3 |
redhat/kernel | <0:4.18.0-240.22.1.el8_3 | 0:4.18.0-240.22.1.el8_3 |
redhat/Linux | <5.10 | 5.10 |
Linux Kernel | <5.9.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 |
Disabling APICV by setting the kvm_intel.enable_apicv=0 parameter helps to avoid this situation.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27152 is classified with a high severity rating due to its potential to cause denial of service.
To fix CVE-2020-27152, update your Linux kernel to version 0:4.18.0-240.22.1.rt7.77.el8_3 or later, or to 5.10.223-1 or later, as recommended.
CVE-2020-27152 affects various Linux kernel versions, specifically those prior to 5.10.
CVE-2020-27152 can lead to a stack overflow, resulting in the crashing of the host kernel and overall system instability.
Yes, CVE-2020-27152 can be exploited by a guest user to crash the host, leading to a denial of service.