In the Linux kernel, the following vulnerability has been resolved:
x86/kvm: Teardown PV features on boot CPU as well
Various PV features (Async PF, PV EOI, steal time) work through memory
shared with hypervisor and when we restore from hibernation we must
properly teardown all these features to make sure hypervisor doesn't
write to stale locations after we jump to the previously hibernated kernel
(which can try to place anything there). For secondary CPUs the job is
already done by kvm_cpu_down_prepare(), register syscore ops to do
the same for boot CPU.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-15T20:14:20.602Z
Updated: 2024-12-19T07:35:28.171Z
Reserved: 2024-03-04T18:12:48.836Z
Link: CVE-2021-47112
Vulnrichment
Updated: 2024-08-04T05:24:39.829Z
NVD
Status : Awaiting Analysis
Published: 2024-03-15T21:15:06.627
Modified: 2024-11-21T06:35:25.327
Link: CVE-2021-47112
Redhat