First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: kvm: LAPIC: Restore guard to prevent illegal APIC register access Per the SDM, "any access that touches bytes 4 through 15 of an APIC register may cause undefined behavior and must not be executed." Worse, such an access in kvm_lapic_reg_read can result in a leak of kernel stack contents. Prior to commit 01402cf81051 ("kvm: LAPIC: write down valid APIC registers"), such an access was explicitly disallowed. Restore the guard that was removed in that commit.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | <14.02cf81051 | |
Linux Kernel | >=5.3<5.4.128 | |
Linux Kernel | >=5.5<5.10.46 | |
Linux Kernel | >=5.11<5.12.13 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 | |
Linux Kernel | =5.13-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47255 has been classified as a high severity vulnerability due to the potential for undefined behavior resulting from illegal APIC register access.
To remediate CVE-2021-47255, upgrading to a patched version of the Linux kernel is necessary where the vulnerability has been resolved.
CVE-2021-47255 affects various versions of the Linux kernel between 5.3 and 5.13-rc6, including several specific release candidates.
CVE-2021-47255 impacts the KVM LAPIC component of the Linux kernel specifically related to APIC register handling.
As of now, there are no confirmed public exploits for CVE-2021-47255, but the vulnerability does present potential risks.