An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition. Upstream patch & commit: https://lore.kernel.org/kvm/20230928173354.217464-1-mlevitsk@redhat.com/T https://github.com/torvalds/linux/commit/b65235f6e102354ccafda601eaa1c5bef5284d21
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2248123]
This was fixed for Fedora with the 6.5.9 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:3854 https://access.redhat.com/errata/RHSA-2024:3854
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:3855 https://access.redhat.com/errata/RHSA-2024:3855
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:4211 https://access.redhat.com/errata/RHSA-2024:4211
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:4352 https://access.redhat.com/errata/RHSA-2024:4352