First published: Fri Oct 07 2022(Updated: )
A deouble-free flaw in the Linux Kernel Intel GVT-g graphics driver found. The problem happens when some system resource on high cost. One way to trigger is to make dma high load. When it gets into the situation when function intel_gvt_dma_map_guest_page failed, the flaw being triggered. Reference: <a href="https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/">https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/Linux kernel | <6.1 | 6.1 |
Linux Kernel | <6.1 | |
Linux Kernel | =6.1 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2022-3707 is classified as high due to the potential for double-free vulnerabilities in the Linux Kernel Intel GVT-g graphics driver.
To fix CVE-2022-3707, update to kernel versions 0:4.18.0-477.10.1.rt7.274.el8_8, 0:4.18.0-477.10.1.el8_8, 0:5.14.0-284.11.1.el9_2, or higher.
CVE-2022-3707 affects systems running specific versions of the Red Hat Enterprise Linux kernel and the Linux kernel.
CVE-2022-3707 occurs when a double-free flaw is triggered due to high resource cost situations in the Intel GVT-g graphics driver.
There is currently no publicly disclosed exploit for CVE-2022-3707, but the vulnerability poses a significant risk when triggered.