In the Linux kernel, the following vulnerability has been resolved: x86/kvm: Teardown PV features on boot CPU as well Various PV features (Async PF, PV EOI, steal time) work through memory shared with hypervisor and when we restore from hibernation we must properly teardown all these features to make sure hypervisor doesn't write to stale locations after we jump to the previously hibernated kernel (which can try to place anything there). For secondary CPUs the job is already done by kvm_cpu_down_prepare(), register syscore ops to do the same for boot CPU.
History

Mon, 04 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-15T20:14:20.602Z

Updated: 2024-12-19T07:35:28.171Z

Reserved: 2024-03-04T18:12:48.836Z

Link: CVE-2021-47112

cve-icon Vulnrichment

Updated: 2024-08-04T05:24:39.829Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-15T21:15:06.627

Modified: 2024-11-21T06:35:25.327

Link: CVE-2021-47112

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-15T00:00:00Z

Links: CVE-2021-47112 - Bugzilla