A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the VMGEXIT
handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (CONFIG_VMAP_STACK
).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | <Â 6.1.52-1 | linux_6.1.52-1_all.deb |
Debian | 11 | all | linux | <Â 5.10.209-2 | linux_5.10.209-2_all.deb |
Debian | 10 | all | linux | <Â 4.19.249-2 | linux_4.19.249-2_all.deb |
Debian | 999 | all | linux | <Â 6.4.11-1 | linux_6.4.11-1_all.deb |
Debian | 13 | all | linux | <Â 6.4.11-1 | linux_6.4.11-1_all.deb |