CVE-2021-47389: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: fix missing sev_decommission in sev_receive_start DECOMMISSION the current SEV context if binding an ASID fails after RECEIVE_START. Per AMD's SEV API, RECEIVE_START generates a new guest context and thus needs to be paired with DECOMMISSION: The RECEIVE_START command is the only command other than the LAUNCH_START command that generates a new guest context and guest handle. The missing DECOMMISSION can result in subsequent SEV launch failures, as the firmware leaks memory and might not able to allocate more SEV guest contexts in the future. Note, LAUNCH_START suffered the same bug, but was previously fixed by commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID binding fails").
AI Analysis
Technical Summary
CVE-2021-47389 is a medium-severity vulnerability affecting the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically the SVM (Secure Virtual Machine) implementation for AMD SEV (Secure Encrypted Virtualization). The vulnerability arises from a missing call to the 'sev_decommission' function during the handling of the 'RECEIVE_START' command in the SEV API. According to AMD's SEV specification, the RECEIVE_START command generates a new guest context and must be paired with a DECOMMISSION operation to properly release any previously allocated resources. The absence of this decommissioning step can cause the firmware to leak memory resources, leading to failures in subsequent SEV guest launches due to exhaustion of available guest contexts. This bug is similar to a previously fixed issue with the 'LAUNCH_START' command, which also required a decommission call if ASID (Address Space Identifier) binding failed. The vulnerability does not directly compromise confidentiality but impacts the integrity and availability of SEV guest virtual machines by causing launch failures and resource leaks. Exploitation requires local access (attack vector: local) but no privileges or user interaction, making it somewhat easier to exploit in environments where unprivileged local access is possible. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.1, reflecting a medium severity level with impact primarily on integrity and availability. The underlying weakness corresponds to CWE-772 (Missing Release of Resource after Effective Lifetime).
Potential Impact
For European organizations, especially those leveraging AMD SEV-enabled virtualization for secure cloud or on-premises workloads, this vulnerability can lead to denial of service conditions where SEV guest VMs fail to launch or operate correctly due to resource leaks in the firmware. This can disrupt critical services relying on confidential computing environments, potentially impacting sectors such as finance, healthcare, and government that prioritize data confidentiality and integrity. While the vulnerability does not expose data directly, the inability to reliably launch or maintain SEV guests can degrade service availability and trust in secure virtualization infrastructure. Organizations using Linux-based hypervisors with AMD SEV support must consider the risk of operational disruption and plan accordingly. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in multi-tenant or shared environments where local access might be attainable by malicious insiders or compromised accounts.
Mitigation Recommendations
To mitigate CVE-2021-47389, organizations should promptly apply the Linux kernel patches that address the missing 'sev_decommission' call during RECEIVE_START processing. Since the vulnerability is in the kernel's KVM SVM code, updating to a Linux kernel version that includes the fix is essential. Additionally, organizations should audit their virtualization environments to identify AMD SEV usage and verify that hypervisor versions are up to date. Monitoring for unusual SEV guest launch failures or resource exhaustion symptoms can help detect exploitation attempts or misconfigurations. Restricting local access to hypervisor hosts and enforcing strict access controls reduces the risk of exploitation. For environments where patching is delayed, consider disabling SEV features if feasible or isolating vulnerable hosts. Finally, coordinate with hardware and firmware vendors to ensure that SEV firmware is also updated to compatible versions that handle resource management correctly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2021-47389: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: fix missing sev_decommission in sev_receive_start DECOMMISSION the current SEV context if binding an ASID fails after RECEIVE_START. Per AMD's SEV API, RECEIVE_START generates a new guest context and thus needs to be paired with DECOMMISSION: The RECEIVE_START command is the only command other than the LAUNCH_START command that generates a new guest context and guest handle. The missing DECOMMISSION can result in subsequent SEV launch failures, as the firmware leaks memory and might not able to allocate more SEV guest contexts in the future. Note, LAUNCH_START suffered the same bug, but was previously fixed by commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID binding fails").
AI-Powered Analysis
Technical Analysis
CVE-2021-47389 is a medium-severity vulnerability affecting the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem, specifically the SVM (Secure Virtual Machine) implementation for AMD SEV (Secure Encrypted Virtualization). The vulnerability arises from a missing call to the 'sev_decommission' function during the handling of the 'RECEIVE_START' command in the SEV API. According to AMD's SEV specification, the RECEIVE_START command generates a new guest context and must be paired with a DECOMMISSION operation to properly release any previously allocated resources. The absence of this decommissioning step can cause the firmware to leak memory resources, leading to failures in subsequent SEV guest launches due to exhaustion of available guest contexts. This bug is similar to a previously fixed issue with the 'LAUNCH_START' command, which also required a decommission call if ASID (Address Space Identifier) binding failed. The vulnerability does not directly compromise confidentiality but impacts the integrity and availability of SEV guest virtual machines by causing launch failures and resource leaks. Exploitation requires local access (attack vector: local) but no privileges or user interaction, making it somewhat easier to exploit in environments where unprivileged local access is possible. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 5.1, reflecting a medium severity level with impact primarily on integrity and availability. The underlying weakness corresponds to CWE-772 (Missing Release of Resource after Effective Lifetime).
Potential Impact
For European organizations, especially those leveraging AMD SEV-enabled virtualization for secure cloud or on-premises workloads, this vulnerability can lead to denial of service conditions where SEV guest VMs fail to launch or operate correctly due to resource leaks in the firmware. This can disrupt critical services relying on confidential computing environments, potentially impacting sectors such as finance, healthcare, and government that prioritize data confidentiality and integrity. While the vulnerability does not expose data directly, the inability to reliably launch or maintain SEV guests can degrade service availability and trust in secure virtualization infrastructure. Organizations using Linux-based hypervisors with AMD SEV support must consider the risk of operational disruption and plan accordingly. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in multi-tenant or shared environments where local access might be attainable by malicious insiders or compromised accounts.
Mitigation Recommendations
To mitigate CVE-2021-47389, organizations should promptly apply the Linux kernel patches that address the missing 'sev_decommission' call during RECEIVE_START processing. Since the vulnerability is in the kernel's KVM SVM code, updating to a Linux kernel version that includes the fix is essential. Additionally, organizations should audit their virtualization environments to identify AMD SEV usage and verify that hypervisor versions are up to date. Monitoring for unusual SEV guest launch failures or resource exhaustion symptoms can help detect exploitation attempts or misconfigurations. Restricting local access to hypervisor hosts and enforcing strict access controls reduces the risk of exploitation. For environments where patching is delayed, consider disabling SEV features if feasible or isolating vulnerable hosts. Finally, coordinate with hardware and firmware vendors to ensure that SEV firmware is also updated to compatible versions that handle resource management correctly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T14:58:30.813Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe8fa8
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 12:13:39 PM
Last updated: 8/11/2025, 11:15:10 AM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.