摘要:
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Handle SRCU initialization failure during page track init
Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism. Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.
[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
安全等级: Low
公告ID: KylinSec-SA-2024-2718
发布日期: 2024年6月13日
关联CVE: CVE-2021-47407
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Handle SRCU initialization failure during page track init
Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism. Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.
[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-47407 | KY3.5.2 | kernel | Unaffected |
CVE-2021-47407 | V6 | kernel | Unaffected |