Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x3f2-q3jq-26fv

Опубликовано: 27 фев. 2024
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Don't use vcpu->run->internal.ndata as an array index

__vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.

In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Don't use vcpu->run->internal.ndata as an array index

__vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.

Связанные уязвимости

ubuntu
почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVSS3: 7.1
redhat
почти 2 года назад

A flaw was found in KVM VMX in the Linux Kernel, where ndata' could be updated by the user process at any time

nvd
почти 2 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

suse-cvrf
больше 1 года назад

Security update for the Linux Kernel

suse-cvrf
больше 1 года назад

Security update for the Linux Kernel