An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
https://www.debian.org/security/2023/dsa-5480
https://security.netapp.com/advisory/ntap-20230214-0007/
https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736
https://bugs.chromium.org/p/project-zero/issues/detail?id=2309
https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-06
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
Source: Mitre, NVD
Published: 2022-09-02
Updated: 2025-05-05
Base Score: 6.8
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.00013