Описание
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory address spaces. If a user attempts to access the read/write devices' MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.
Отчет
This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. This issue affects the versions of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue. A regression of CVE-2020-12888 has been reintroduced in RHEL 9.4–9.6 due to the backport of the fork: defer linking file vma patch (related to CVE-2024-27022). This flaw allows a privileged VFIO userspace process to retain stale MMIO mappings after a fork(), leading to host crashes if the child process accesses the device after MMIO has been disabled. While the bug was transient in upstream (v6.9 only), it remains present in multiple RHEL9 releases. Only users with high privileges and access to a VFIO-assigned device can exploit this, and no impact is observed in standard QEMU or DPDK configurations. Regarding this regression, the status of RHEL-9 fixes (fixed for 9.7 and 9.6 for the 21 Jul 2025 and pending for 9.4): RHEL-9.7: RHEL-73613 (kernel-5.14.0-578.el9) RHEL-9.6.z: RHEL-85623 (kernel-5.14.0-570.26.1.el9_6) RHEL-9.5.z: N/A RHEL-9.4.z: RHEL-85621 (under development) The 9.7 and 9.6.z fixes backport the upstream solution while the 9.4.z fix is pursuing a RHEL specific fix to reduce the scope and risk. RHEL-10 is not affected, because branched at 6.12.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise MRG 2 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2020:2665 | 23.06.2020 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2020:2664 | 23.06.2020 |
Red Hat Enterprise Linux 7 | kernel-alt | Fixed | RHSA-2020:2854 | 07.07.2020 |
Red Hat Enterprise Linux 7.2 Advanced Update Support | kernel | Fixed | RHSA-2020:2831 | 07.07.2020 |
Red Hat Enterprise Linux 7.3 Advanced Update Support | kernel | Fixed | RHSA-2020:2832 | 07.07.2020 |
Red Hat Enterprise Linux 7.3 Telco Extended Update Support | kernel | Fixed | RHSA-2020:2832 | 07.07.2020 |
Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions | kernel | Fixed | RHSA-2020:2832 | 07.07.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles atte ...
The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
EPSS
5.3 Medium
CVSS3