A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
References
Link | Resource |
---|---|
https://www.openwall.com/lists/oss-security/2022/04/07/1 | Exploit Mailing List Third Party Advisory |
https://github.com/torvalds/linux/commit/5593473a1e6c743764b08e3b6071cb43b5cfa6c4 | Patch Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2022-1263 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2072698 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-08-31 09:15
Updated : 2022-09-07 06:11
NVD link : CVE-2022-1263
Mitre link : CVE-2022-1263
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel