Vulnerability Details : CVE-2022-2153
Potential exploit
A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2022-2153
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-2153
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-2153
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2022-2153
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2022-2153
-
https://bugzilla.redhat.com/show_bug.cgi?id=2069736
2069736 – (CVE-2022-2153) CVE-2022-2153 kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()Issue Tracking;Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
[SECURITY] [DLA 3131-1] linux security updateMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
[SECURITY] [DLA 3173-1] linux-5.10 security updateMailing List;Third Party Advisory
-
https://github.com/torvalds/linux/commit/7ec37d1cbe17d8189d9562178d8b29167fe1c31a
KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq · torvalds/linux@7ec37d1 · GitHubPatch;Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2022/06/22/1
oss-security - CVE-2022-2153: Linux Kernel: x86/kvm: NULL pointer dereference in kvm_irq_delivery_to_apic_fastExploit;Mailing List;Patch;Third Party Advisory
-
https://github.com/torvalds/linux/commit/b1e34d325397a33d97d845e312d7cf2a8b646b44
KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activ… · torvalds/linux@b1e34d3 · GitHubPatch;Third Party Advisory
-
https://github.com/torvalds/linux/commit/00b5f37189d24ac3ed46cb7f11742094778c46ce
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_deliv… · torvalds/linux@00b5f37 · GitHubPatch;Third Party Advisory
Jump to