A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2072698 | issue tracking third party advisory patch |
https://www.openwall.com/lists/oss-security/2022/04/07/1 | mailing list exploit third party advisory |
https://github.com/torvalds/linux/commit/5593473a1e6c743764b08e3b6071cb43b5cfa6c4 | third party advisory patch |
https://access.redhat.com/security/cve/CVE-2022-1263 | third party advisory |