跳转到帖子

Ubuntu: (CVE-2022-48793): linux-intel-iotg-5.15 vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2022-48793): linux-intel-iotg-5.15 vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
07/16/2024
Created
11/21/2024
Added
11/19/2024
Modified
01/30/2025

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: nSVM: fix potential NULL derefernce on nested migration Turns out that due to review feedback and/or rebases I accidentally moved the call to nested_svm_load_cr3 to be too early, before the NPT is enabled, which is very wrong to do. KVM can't even access guest memory at that point as nested NPT is needed for that, and of course it won't initialize the walk_mmu, which is main issue the patch was addressing. Fix this for real.

Solution(s)

  • ubuntu-upgrade-linux-intel-iotg-5-15

References

  • https://attackerkb.com/topics/cve-2022-48793
  • CVE - 2022-48793
  • https://git.kernel.org/linus/e1779c2714c3023e4629825762bcbc43a3b943df
  • https://git.kernel.org/stable/c/352193edda48e08e8824a7ece09aec830a603cfe
  • https://git.kernel.org/stable/c/74b426bea4f7e3b081add2b88d4fba16d3af7ab6
  • https://git.kernel.org/stable/c/e1779c2714c3023e4629825762bcbc43a3b943df
  • https://www.cve.org/CVERecord?id=CVE-2022-48793
  • 查看数 698
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…