Vulnerability Details : CVE-2021-46907
In the Linux kernel, the following vulnerability has been resolved:
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index
__vmx_handle_exit() uses vcpu->run->internal.ndata as an index for
an array access. Since vcpu->run is (can be) mapped to a user address
space with a writer permission, the 'ndata' could be updated by the
user process at anytime (the user process can set it to outside the
bounds of the array).
So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.
Products affected by CVE-2021-46907
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2021-46907
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
References for CVE-2021-46907
-
https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index - kernel/git/stable/linux.git - Linux kernel stable tree
Jump to