In the Linux kernel, the following vulnerability has been resolved: kvm:
LAPIC: Restore guard to prevent illegal APIC register access Per the SDM,
“any access that touches bytes 4 through 15 of an APIC register may cause
undefined behavior and must not be executed.” Worse, such an access in
kvm_lapic_reg_read can result in a leak of kernel stack contents. Prior to
commit 01402cf81051 (“kvm: LAPIC: write down valid APIC registers”), such
an access was explicitly disallowed. Restore the guard that was removed in
that commit.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/218bf772bddd221489c38dde6ef8e917131161f6 (5.13-rc7)
git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5
git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6
git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210
git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84
launchpad.net/bugs/cve/CVE-2021-47255
nvd.nist.gov/vuln/detail/CVE-2021-47255
security-tracker.debian.org/tracker/CVE-2021-47255
www.cve.org/CVERecord?id=CVE-2021-47255