KVM:VMX:不要使用 vcpu->run->internal.ndata 作为数组索引 (CVE-2021-46907)

admin 2024-02-28 12:53:42 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
KVM:VMX:不要使用 vcpu->run->internal.ndata 作为数组索引 (CVE-2021-46907)

CVE编号

CVE-2021-46907

利用情况

暂无

补丁情况

N/A

披露时间

2024-02-27
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Don't use vcpu->run->internal.ndata as an array index __vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050
https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0