A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-02T07:17:12.158Z
Reserved: 2023-08-04T14:48:29.732Z
Link: CVE-2023-4155

No data.

Status : Modified
Published: 2023-09-13T17:15:10.143
Modified: 2024-11-21T08:34:30.017
Link: CVE-2023-4155
