In the Linux kernel, the following vulnerability has been resolved: kvm: LAPIC: Restore guard to prevent illegal APIC register access Per the SDM, "any access that touches bytes 4 through 15 of an APIC register may cause undefined behavior and must not be executed." Worse, such an access in kvm_lapic_reg_read can result in a leak of kernel stack contents. Prior to commit 01402cf81051 ("kvm: LAPIC: write down valid APIC registers"), such an access was explicitly disallowed. Restore the guard that was removed in that commit.
History

Mon, 04 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-05-21T14:19:50.125Z

Updated: 2024-11-04T12:02:24.105Z

Reserved: 2024-04-10T18:59:19.539Z

Link: CVE-2021-47255

cve-icon Vulnrichment

Updated: 2024-08-04T05:32:07.995Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-21T15:15:14.303

Modified: 2024-05-21T16:54:26.047

Link: CVE-2021-47255

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-21T00:00:00Z

Links: CVE-2021-47255 - Bugzilla