2024-05-26 02:03:22 +00:00

32 lines
1.7 KiB
JSON

{
"id": "CVE-2021-47407",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:26.247",
"lastModified": "2024-05-21T16:54:26.047",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Handle SRCU initialization failure during page track init\n\nCheck the return of init_srcu_struct(), which can fail due to OOM, when\ninitializing the page track mechanism. Lack of checking leads to a NULL\npointer deref found by a modified syzkaller.\n\n[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]"
},
{
"lang": "es",
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Manejar el error de inicializaci\u00f3n de SRCU durante el inicio del seguimiento de la p\u00e1gina. Verifique el retorno de init_srcu_struct(), que puede fallar debido a OOM, al inicializar el mecanismo de seguimiento de la p\u00e1gina. La falta de verificaci\u00f3n conduce a un puntero NULL deref encontrado por un syzkaller modificado. [Mueva la llamada hacia el principio de kvm_arch_init_vm. -Paolo]"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}