Impact
The Linux kernel KVM hypervisor contains a bug in the __get_sregs2() function, where reading the PDPTR registers occurs without SRCU protection. This represents a classic concurrency issue, categorized as CWE‑362, where proper synchronization between threads is lacking. The race can allow the kernel to dereference guest memory while only the vcpu mutex is held, bypassing the SRCU checks required by __kvm_memslots() and potentially corrupting kernel data structures or triggering a system crash.
Affected Systems
All x86 Linux kernel releases that include the KVM hypervisor but do not contain the SRCU guard in __get_sregs2(). No distribution or kernel version is specified, so any kernel built before the patch is considered vulnerable.
Risk and Exploitability
No public CVSS or EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker to use the KVM ioctl interface from within a guest or from a privileged host process, meaning it is a local attack surface. While the attack vector is narrow and would need crafted input, the potential to corrupt kernel memory or cause a crash could lead to denial of service or a loss of integrity for the host. Operators should regard the patch as essential to mitigate this risk.
OpenCVE Enrichment