Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12888

Опубликовано: 14 мая 2020
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices' MMIO memory address spaces. If a user attempts to access the read/write devices' MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.

Отчет

This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. This issue affects the versions of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue. A regression of CVE-2020-12888 has been reintroduced in RHEL 9.4–9.6 due to the backport of the fork: defer linking file vma patch (related to CVE-2024-27022). This flaw allows a privileged VFIO userspace process to retain stale MMIO mappings after a fork(), leading to host crashes if the child process accesses the device after MMIO has been disabled. While the bug was transient in upstream (v6.9 only), it remains present in multiple RHEL9 releases. Only users with high privileges and access to a VFIO-assigned device can exploit this, and no impact is observed in standard QEMU or DPDK configurations. Regarding this regression, the status of RHEL-9 fixes (fixed for 9.7 and 9.6 for the 21 Jul 2025 and pending for 9.4): RHEL-9.7: RHEL-73613 (kernel-5.14.0-578.el9) RHEL-9.6.z: RHEL-85623 (kernel-5.14.0-570.26.1.el9_6) RHEL-9.5.z: N/A RHEL-9.4.z: RHEL-85621 (under development) The 9.7 and 9.6.z fixes backport the upstream solution while the 9.4.z fix is pursuing a RHEL specific fix to reduce the scope and risk. RHEL-10 is not affected, because branched at 6.12.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise MRG 2kernel-rtNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2020:266523.06.2020
Red Hat Enterprise Linux 7kernelFixedRHSA-2020:266423.06.2020
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2020:285407.07.2020
Red Hat Enterprise Linux 7.2 Advanced Update SupportkernelFixedRHSA-2020:283107.07.2020
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2020:283207.07.2020
Red Hat Enterprise Linux 7.3 Telco Extended Update SupportkernelFixedRHSA-2020:283207.07.2020
Red Hat Enterprise Linux 7.3 Update Services for SAP SolutionskernelFixedRHSA-2020:283207.07.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-248
https://bugzilla.redhat.com/show_bug.cgi?id=1836244Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario

EPSS

Процентиль: 29%
0.00101
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 5 лет назад

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

CVSS3: 5.3
nvd
больше 5 лет назад

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

CVSS3: 5.3
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 5.3
debian
больше 5 лет назад

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles atte ...

CVSS3: 5.3
github
больше 3 лет назад

The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.

EPSS

Процентиль: 29%
0.00101
Низкий

5.3 Medium

CVSS3