CVE-2023-4155
CVSS V2 None
CVSS V3 None
Description
A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
Overview
- CVE ID
- CVE-2023-4155
- Assigner
- redhat
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-09-13T16:11:39.213Z
- Last Modified Date
- 2023-09-13T16:11:39.213Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-4155 | vdb-entry x_refsource_REDHAT |
https://bugzilla.redhat.com/show_bug.cgi?id=2213802 | issue-tracking x_refsource_REDHAT |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-4155 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 19:10:17 | Added to TrackCVE |