Updated: 2024-11-24 04:53:44.835252
Description:
arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | MEDIUM | 6.9 |
CVSS Version 3.x | HIGH | 7.4 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
CentOS 6 ELS | kernel | 2.6.32 | 7.4 | HIGH | Not Vulnerable | 2021-12-09 07:57:25 | ||
CentOS 8.4 ELS | kernel | 4.18.0 | 7.4 | HIGH | Released | CLSA-2022:1651145959 | 2022-04-28 15:59:35 | |
CentOS 8.5 ELS | kernel | 4.18.0 | 7.4 | HIGH | Ignored | 2022-02-21 08:38:31 | ||
CloudLinux 6 ELS | kernel | 2.6.32 | 7.4 | HIGH | Not Vulnerable | 2022-03-30 18:50:56 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 7.4 | HIGH | Not Vulnerable | 2022-03-30 18:50:56 | ||
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.4 | HIGH | Not Vulnerable | 2023-02-09 13:05:02 | ||
Ubuntu 16.04 ELS | linux | 4.4.0 | 7.4 | HIGH | Not Vulnerable | 2022-02-17 08:55:46 | ||
Ubuntu 18.04 ELS | linux | 4.15.0 | 7.4 | HIGH | Not Vulnerable | 2023-08-28 21:18:52 |