Skip to main content

CVE-2021-47008: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47008cvecve-2021-47008
Published: Wed Feb 28 2024 (02/28/2024, 08:13:27 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Make sure GHCB is mapped before updating Access to the GHCB is mainly in the VMGEXIT path and it is known that the GHCB will be mapped. But there are two paths where it is possible the GHCB might not be mapped. The sev_vcpu_deliver_sipi_vector() routine will update the GHCB to inform the caller of the AP Reset Hold NAE event that a SIPI has been delivered. However, if a SIPI is performed without a corresponding AP Reset Hold, then the GHCB might not be mapped (depending on the previous VMEXIT), which will result in a NULL pointer dereference. The svm_complete_emulated_msr() routine will update the GHCB to inform the caller of a RDMSR/WRMSR operation about any errors. While it is likely that the GHCB will be mapped in this situation, add a safe guard in this path to be certain a NULL pointer dereference is not encountered.

AI-Powered Analysis

AILast updated: 06/30/2025, 19:11:51 UTC

Technical Analysis

CVE-2021-47008 is a vulnerability identified in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically related to the SVM (Secure Virtual Machine) implementation used for AMD virtualization extensions. The issue arises from improper handling of the GHCB (Guest Hypervisor Communication Block), a memory region used for communication between the guest virtual machine and the hypervisor in AMD SEV (Secure Encrypted Virtualization) environments. The vulnerability occurs because the GHCB is not always guaranteed to be mapped before certain operations update it. Two specific code paths are affected: the sev_vcpu_deliver_sipi_vector() routine, which updates the GHCB to notify about a SIPI (Startup Inter-Processor Interrupt) delivery related to AP Reset Hold NAE events, and the svm_complete_emulated_msr() routine, which updates the GHCB to report errors from RDMSR/WRMSR (read/write model-specific registers) operations. In scenarios where a SIPI is delivered without a corresponding AP Reset Hold, or when the GHCB is not mapped due to the previous VMEXIT state, these routines may attempt to dereference a NULL pointer, leading to a kernel NULL pointer dereference. This can cause a denial of service (system crash) or potentially be leveraged for privilege escalation or other attacks depending on the context. The patch ensures that the GHCB is always mapped before updates, preventing the NULL pointer dereference. No known exploits are currently reported in the wild for this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2021-47008 primarily concerns environments running Linux with KVM virtualization on AMD processors supporting SEV. Organizations relying on virtualized infrastructure for cloud services, data centers, or internal virtualization may experience system instability or crashes if this vulnerability is triggered, leading to potential denial of service. While the vulnerability does not currently have known exploits, the risk of kernel crashes can disrupt critical services and workloads. Additionally, if exploited in a targeted manner, it could potentially allow attackers to escalate privileges within virtualized environments, threatening confidentiality and integrity of sensitive data. Given the widespread use of Linux in enterprise and cloud environments across Europe, especially in sectors like finance, telecommunications, and government, the vulnerability poses a tangible risk to operational continuity and data security if left unpatched.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address CVE-2021-47008 as soon as they become available from their Linux distribution vendors. Specifically, ensure that kernel versions include the fix that guarantees GHCB mapping before updates in the affected KVM SVM code paths. Organizations using custom or older kernels should backport the patch or upgrade to a supported kernel version. Additionally, organizations should audit their virtualized environments running on AMD SEV-enabled hardware to identify vulnerable systems. Implement monitoring for unusual VM crashes or kernel panics that could indicate exploitation attempts. Employ strict access controls and limit administrative privileges on hypervisor hosts to reduce the risk of exploitation. Finally, maintain up-to-date backups and disaster recovery plans to mitigate potential service disruptions caused by exploitation or crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-27T18:42:55.952Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9a37

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/30/2025, 7:11:51 PM

Last updated: 8/9/2025, 6:25:45 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats