A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
History

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-02-27T20:52:55.595Z

Reserved: 2023-08-04T14:48:29.732Z

Link: CVE-2023-4155

cve-icon Vulnrichment

Updated: 2024-08-02T07:17:12.158Z

cve-icon NVD

Status : Modified

Published: 2023-09-13T17:15:10.143

Modified: 2024-11-21T08:34:30.017

Link: CVE-2023-4155

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-08-04T00:00:00Z

Links: CVE-2023-4155 - Bugzilla