First published: Fri Mar 01 2013(Updated: )
Description of the problem: If the guest specifies a IOAPIC_REG_SELECT with an invalid value and follows that with a read of the IOAPIC_REG_WINDOW KVM does not properly validate that request. ioapic_read_indirect contains an ASSERT(redir_index < IOAPIC_NUM_PINS), but the ASSERT has no effect in non-debug builds. In recent kernels this allows a guest to cause a kernel oops by reading invalid memory. In older kernels (pre-3.3) this allows a guest to read from large ranges of host memory. Acknowledgements: Red Hat would like to thank Andrew Honig of Google for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux kernel | >3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-917017 is considered to be high due to the potential for denial of service vulnerabilities.
To fix REDHAT-BUG-917017, apply the latest patches provided by Red Hat for the affected kernel version.
REDHAT-BUG-917017 affects the Red Hat Kernel version 3.3 and above.
REDHAT-BUG-917017 impacts the IOAPIC handling within the KVM virtualization environment.
Currently, there is no publicly known exploit for REDHAT-BUG-917017, but it is advisable to mitigate the risk by applying the patches.