First published: Wed May 25 2022(Updated: )
A flaw was found in KVM. With shadow paging enabled if INVPCID is executed with CR0.PG=0, the invlpg callback is not set, and the result is a NULL pointer dereference. This flaw allows a guest user to cause a kernel oops condition on the host, resulting in a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/kernel | <5.18 | 5.18 |
Linux kernel | <5.8 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 | |
Red Hat Enterprise Linux | =9.0 | |
Debian | =11.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1789 is classified as a denial of service vulnerability due to a NULL pointer dereference that can cause a kernel oops condition.
To fix CVE-2022-1789, update the kernel to version 0:4.18.0-477.10.1.rt7.274.el8_8 or higher for Red Hat environments.
CVE-2022-1789 affects various versions of the Linux kernel, including specific builds for Red Hat and Fedora.
CVE-2022-1789 is a flaw found in KVM (Kernel-based Virtual Machine) that can be exploited to cause denial of service.
Yes, guest users can exploit CVE-2022-1789 to trigger a kernel oops condition on the host system.