Vulnerability Name: | CVE-2020-27152 (CCN-191063) | ||||||||||||||||||
Assigned: | 2020-08-02 | ||||||||||||||||||
Published: | 2020-08-02 | ||||||||||||||||||
Updated: | 2020-11-16 | ||||||||||||||||||
Summary: | An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to improper interaction between a resampler and edge triggering, aka CID-77377064c3a9. | ||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||
Vulnerability Type: | CWE-835 | ||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-27152 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20201103 CVE-2020-27152 Kernel: KVM: host stack overflow via loop due to lazy update IOAPIC Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.kernel.org/show_bug.cgi?id=208767 Source: CONFIRM Type: Mailing List, Release Notes, Vendor Advisory https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.2 Source: XF Type: UNKNOWN linux-kernel-cve202027152-dos(191063) Source: CCN Type: Linux Kernel GIT Repository KVM: ioapic: break infinite recursion on lazy EOI Source: CONFIRM Type: Mailing List, Patch, Vendor Advisory https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77377064c3a94911339f13ce113b3abf265e06da Source: CCN Type: oss-sec Mailing List, Tue, 3 Nov 2020 16:25:31 +0530 (IST) CVE-2020-27152 Kernel: KVM: host stack overflow via loop due to lazy update IOAPIC | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |