A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-27T20:52:55.595Z
Reserved: 2023-08-04T14:48:29.732Z
Link: CVE-2023-4155

Updated: 2024-08-02T07:17:12.158Z

Status : Modified
Published: 2023-09-13T17:15:10.143
Modified: 2024-11-21T08:34:30.017
Link: CVE-2023-4155
