CVE-2021-47062
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
29/02/2024
Last modified:
10/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs<br />
<br />
Use the kvm_for_each_vcpu() helper to iterate over vCPUs when encrypting<br />
VMSAs for SEV, which effectively switches to use online_vcpus instead of<br />
created_vcpus. This fixes a possible null-pointer dereference as<br />
created_vcpus does not guarantee a vCPU exists, since it is updated at<br />
the very beginning of KVM_CREATE_VCPU. created_vcpus exists to allow the<br />
bulk of vCPU creation to run in parallel, while still correctly<br />
restricting the max number of max vCPUs.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.11.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40
- https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2
- https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1
- https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40
- https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2
- https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1



