Description
A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24596 | A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. |
Ubuntu USN |
USN-5469-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T23:55:24.614Z
Reserved: 2022-04-06T00:00:00.000Z
Link: CVE-2022-1263
No data.
Status : Modified
Published: 2022-08-31T16:15:09.290
Modified: 2024-11-21T06:40:22.043
Link: CVE-2022-1263
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN