CVE-2021-47389
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: SVM: fix missing sev_decommission in sev_receive_start<br />
<br />
DECOMMISSION the current SEV context if binding an ASID fails after<br />
RECEIVE_START. Per AMD&#39;s SEV API, RECEIVE_START generates a new guest<br />
context and thus needs to be paired with DECOMMISSION:<br />
<br />
The RECEIVE_START command is the only command other than the LAUNCH_START<br />
command that generates a new guest context and guest handle.<br />
<br />
The missing DECOMMISSION can result in subsequent SEV launch failures,<br />
as the firmware leaks memory and might not able to allocate more SEV<br />
guest contexts in the future.<br />
<br />
Note, LAUNCH_START suffered the same bug, but was previously fixed by<br />
commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID<br />
binding fails").
Impact
Base Score 3.x
5.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.14.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



