Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2021-46907
HistoryFeb 27, 2024 - 7:15 a.m.

CVE-2021-46907

2024-02-2707:15:00
Debian Security Bug Tracker
security-tracker.debian.org
9
linux kernel
kvm vulnerability
vmx
array access vulnerability

AI Score

7

Confidence

High

EPSS

0

Percentile

9.0%

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Don’t use vcpu->run->internal.ndata as an array index __vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the ‘ndata’ could be updated by the user process at anytime (the user process can set it to outside the bounds of the array). So, it is not safe that __vmx_handle_exit() uses the ‘ndata’ that way.

AI Score

7

Confidence

High

EPSS

0

Percentile

9.0%