Bug 2440621 (CVE-2026-23215)
| Summary: | CVE-2026-23215 kernel: x86/vmware: Fix hypercall clobbers | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in the Linux kernel's VMware guest support on x86_64 systems. When running under QEMU with VMware mouse emulation, the vmware_hypercall3() and vmware_hypercall4() functions do not properly mark the RDI and RSI registers as clobbered. The QEMU vmmouse driver incorrectly clears the upper 32 bits of these registers, causing kernel pointer truncation. This results in a page fault when the corrupted pointer is dereferenced, leading to a kernel crash.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2026-02-18 15:02:09 UTC
|