First published: Tue Mar 29 2022(Updated: )
A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-425.3.1.rt7.213.el8 | 0:4.18.0-425.3.1.rt7.213.el8 |
redhat/kernel | <0:4.18.0-425.3.1.el8 | 0:4.18.0-425.3.1.el8 |
redhat/kernel | <0:4.18.0-193.95.1.el8_2 | 0:4.18.0-193.95.1.el8_2 |
redhat/kernel-rt | <0:4.18.0-193.95.1.rt13.146.el8_2 | 0:4.18.0-193.95.1.rt13.146.el8_2 |
redhat/kernel-rt | <0:4.18.0-305.71.1.rt7.143.el8_4 | 0:4.18.0-305.71.1.rt7.143.el8_4 |
redhat/kernel | <0:4.18.0-305.71.1.el8_4 | 0:4.18.0-305.71.1.el8_4 |
redhat/kernel | <0:4.18.0-372.36.1.el8_6 | 0:4.18.0-372.36.1.el8_6 |
redhat/kernel | <0:5.14.0-162.6.1.el9_1 | 0:5.14.0-162.6.1.el9_1 |
redhat/kernel-rt | <0:5.14.0-162.6.1.rt21.168.el9_1 | 0:5.14.0-162.6.1.rt21.168.el9_1 |
redhat/kernel | <0:5.14.0-70.36.1.el9_0 | 0:5.14.0-70.36.1.el9_0 |
redhat/kernel-rt | <0:5.14.0-70.36.1.rt21.108.el9_0 | 0:5.14.0-70.36.1.rt21.108.el9_0 |
Linux Linux kernel | >=5.2<5.4.189 | |
Linux Linux kernel | >=5.5<5.10.110 | |
Linux Linux kernel | >=5.11<5.15.33 | |
Linux Linux kernel | >=5.16<5.16.19 | |
Linux Linux kernel | >=5.17<5.17.2 | |
Fedoraproject Fedora | =36 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
redhat/kernel | <5.18 | 5.18 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.6-1 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)