CVE-2021-29657

Updated: 2024-11-24 04:53:44.835252

Description:

arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 6.9
CVSS Version 3.x HIGH 7.4

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CentOS 6 ELS kernel 2.6.32 7.4 HIGH Not Vulnerable 2021-12-09 07:57:25
CentOS 8.4 ELS kernel 4.18.0 7.4 HIGH Released CLSA-2022:1651145959 2022-04-28 15:59:35
CentOS 8.5 ELS kernel 4.18.0 7.4 HIGH Ignored 2022-02-21 08:38:31
CloudLinux 6 ELS kernel 2.6.32 7.4 HIGH Not Vulnerable 2022-03-30 18:50:56
Oracle Linux 6 ELS kernel 2.6.32 7.4 HIGH Not Vulnerable 2022-03-30 18:50:56
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.4 HIGH Not Vulnerable 2023-02-09 13:05:02
Ubuntu 16.04 ELS linux 4.4.0 7.4 HIGH Not Vulnerable 2022-02-17 08:55:46
Ubuntu 18.04 ELS linux 4.15.0 7.4 HIGH Not Vulnerable 2023-08-28 21:18:52