CVE-2021-47389

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
02/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> KVM: SVM: fix missing sev_decommission in sev_receive_start<br /> <br /> DECOMMISSION the current SEV context if binding an ASID fails after<br /> RECEIVE_START. Per AMD&amp;#39;s SEV API, RECEIVE_START generates a new guest<br /> context and thus needs to be paired with DECOMMISSION:<br /> <br /> The RECEIVE_START command is the only command other than the LAUNCH_START<br /> command that generates a new guest context and guest handle.<br /> <br /> The missing DECOMMISSION can result in subsequent SEV launch failures,<br /> as the firmware leaks memory and might not able to allocate more SEV<br /> guest contexts in the future.<br /> <br /> Note, LAUNCH_START suffered the same bug, but was previously fixed by<br /> commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID<br /> binding fails").

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.14.10 (excluding)
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*