A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2023-09-13T16:11:39.213Z

Updated: 2024-08-02T07:17:12.158Z

Reserved: 2023-08-04T14:48:29.732Z

Link: CVE-2023-4155

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-13T17:15:10.143

Modified: 2024-11-21T08:34:30.017

Link: CVE-2023-4155

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-08-04T00:00:00Z

Links: CVE-2023-4155 - Bugzilla