In the Linux kernel, the following vulnerability has been resolved:
x86/kvm: Disable kvmclock on all CPUs on shutdown
Currenly, we disable kvmclock from machine_shutdown() hook and this
only happens for boot CPU. We need to disable it for all CPUs to
guard against memory corruption e.g. on restore from hibernate.
Note, writing '0' to kvmclock MSR doesn't clear memory location, it
just prevents hypervisor from updating the location so for the short
while after write and while CPU is still alive, the clock remains usable
and correct so we don't need to switch to some other clocksource.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-15T20:14:19.183Z
Updated: 2024-11-04T11:59:36.144Z
Reserved: 2024-03-04T18:12:48.836Z
Link: CVE-2021-47110
Vulnrichment
Updated: 2024-08-04T05:24:39.913Z
NVD
Status : Awaiting Analysis
Published: 2024-03-15T21:15:06.530
Modified: 2024-03-17T22:38:29.433
Link: CVE-2021-47110
Redhat