First published: Mon May 30 2022(Updated: )
A flaw was found in the x86 KVM subsystem in kvm_steal_time_set_preempted in arch/x86/kvm/x86.c in the Linux kernel. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/kernel | <5.19 | 5.19 |
Google Android | ||
Linux Kernel | >=4.16<5.4.244 | |
Linux Kernel | >=5.5.0<5.10.180 | |
Linux Kernel | >=5.11<5.15.60 | |
Linux Kernel | >=5.16<5.18.17 | |
netapp hci baseboard management controller | =h300s | |
netapp hci baseboard management controller | =h410c | |
netapp hci baseboard management controller | =h410s | |
netapp hci baseboard management controller | =h500s | |
netapp hci baseboard management controller | =h700s | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-39189 has a high severity rating due to its potential to allow unprivileged guest users to compromise the guest kernel.
To fix CVE-2022-39189, update to the recommended kernel versions specified in the remediation section.
CVE-2022-39189 impacts various versions of the Linux kernel and specific NetApp HCI baseboard management controllers.
CVE-2022-39189 does not appear to be a remotely exploitable vulnerability, as it involves unprivileged access within guest environments.
Currently, there are no known workarounds for CVE-2022-39189 other than applying the appropriate updates.