In the Linux kernel, the following vulnerability has been resolved: vhost-vdpa: fix vm_flags for virtqueue doorbell mapping The virtqueue doorbell is usually implemented via registeres but we don't provide the necessary vma->flags like VM_PFNMAP. This may cause several issues e.g when userspace tries to map the doorbell via vhost IOTLB, kernel may panic due to the page is not backed by page structure. This patch fixes this by setting the necessary vm_flags. With this patch, try to map doorbell via IOTLB will fail with bad address.
History

Mon, 04 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-02-27T18:47:04.253Z

Updated: 2024-11-04T11:56:49.945Z

Reserved: 2024-02-27T18:42:55.943Z

Link: CVE-2021-46967

cve-icon Vulnrichment

Updated: 2024-08-04T05:17:43.025Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-27T19:04:07.170

Modified: 2024-02-28T14:06:45.783

Link: CVE-2021-46967

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-02-27T00:00:00Z

Links: CVE-2021-46967 - Bugzilla