First published: Thu Dec 02 2021(Updated: )
A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.15 | 5.15 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Linux Kernel | >=5.11<5.14.16 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =35 | |
Ubuntu | =20.04 | |
Ubuntu | =21.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4093 has been classified with a high severity rating due to the potential for out-of-bounds reads and writes in the host kernel.
To fix CVE-2021-4093, ensure your system is updated to kernel version 5.15 or later, or apply the specific patches available for your distribution.
CVE-2021-4093 affects various systems including Red Hat Enterprise Linux 8.0, Fedora 35, and specific versions of Ubuntu Linux.
Yes, CVE-2021-4093 can potentially allow an attacker to exploit the vulnerability to execute arbitrary code on the host system.
It is the responsibility of system administrators and vendors to monitor for patches and updates related to CVE-2021-4093 to ensure systems remain secure.