First published: Thu Feb 03 2022(Updated: )
A vulnerability was found in kvm_s390_guest_sida_op in arch/s390/kvm/kvm-s390.c in KVM for s390 in the Linux kernel. In this flaw, a local attacker with a normal user privilege may impact in unauthorized memory write access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:4.18.0-348.20.1.el8_5 | 0:4.18.0-348.20.1.el8_5 |
redhat/kernel | <0:4.18.0-305.40.1.el8_4 | 0:4.18.0-305.40.1.el8_4 |
redhat/kernel | <5.17 | 5.17 |
Linux Kernel | <5.17 | |
Linux Kernel | =5.17-rc1 | |
Linux Kernel | =5.17-rc2 | |
Linux Kernel | =5.17-rc3 | |
Fedora | =34 | |
Fedora | =35 | |
Debian | =11.0 | |
All of | ||
Red Hat Virtualization Host EUS | =4.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.4 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =8.4 | |
All of | ||
Red Hat CodeReady Linux Builder | ||
Any of | ||
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H500E | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
All of | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
Red Hat Virtualization Host EUS | =4.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat CodeReady Linux Builder | ||
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
NetApp H500E | ||
NetApp H500e Firmware | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.17-1 |
As the kvm.ko kernel module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions: # echo "install kvm /bin/true" >> /etc/modprobe.d/disable-kvm.conf If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0516 is classified as a medium severity vulnerability due to its potential for unauthorized memory writes.
CVE-2022-0516 affects specific versions of the Linux kernel including 4.18.0-348.20.1.el8_5 and others up to version 5.17.
To fix CVE-2022-0516, you should update to the patched versions of the kernel provided by your distribution, such as Red Hat or Debian.
CVE-2022-0516 can be exploited by a local attacker with normal user privileges.
Exploitation of CVE-2022-0516 may allow an attacker to perform unauthorized memory write access, potentially leading to data corruption or further privilege escalation.