First published: Thu Feb 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs Use the kvm_for_each_vcpu() helper to iterate over vCPUs when encrypting VMSAs for SEV, which effectively switches to use online_vcpus instead of created_vcpus. This fixes a possible null-pointer dereference as created_vcpus does not guarantee a vCPU exists, since it is updated at the very beginning of KVM_CREATE_VCPU. created_vcpus exists to allow the bulk of vCPU creation to run in parallel, while still correctly restricting the max number of max vCPUs.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.11<5.11.21 | |
Linux Kernel | >=5.12<5.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47062 has a moderate severity level related to the Linux kernel's virtualization handling.
CVE-2021-47062 affects Linux kernel versions between 5.11 and 5.12, specifically up to 5.11.21 and 5.12.4.
To fix CVE-2021-47062, you should update your Linux kernel to the latest patched version available.
Yes, CVE-2021-47062 involves a vulnerability in the KVM (Kernel-based Virtual Machine) implementation within the Linux kernel.
CVE-2021-47062 could potentially affect the security of virtual machines by improperly managing vCPUs during encryption processes.