Lucene search

K
redhatcveRedhat.comRH:CVE-2023-30456
HistoryApr 20, 2023 - 9:01 p.m.

CVE-2023-30456

2023-04-2021:01:20
redhat.com
access.redhat.com
51
kvm
intel
nested virtualization
flaw
malicious guest
crash
host system
denial of service
mitigation

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%

A flaw was found in the KVM’s Intel nested virtualization feature (nVMX). The effective values of the guest CR0 and CR4 registers could differ from those included in the VMCS12. In rare circumstances (i.e., kvm_intel module loaded with parameters nested=1 and ept=0) this could allow a malicious guest to crash the host system, causing a denial of service.

Mitigation

This vulnerability can be mitigated by disabling the nested virtualization feature:

# modprobe -r kvm_intel  
# modprobe kvm_intel nested=0  

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%