A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.
6.5.0-9.95.3.0-18.195.3.0-24.265.4.0-9.125.13.0-19.195.15.0-17.174.13.0-16.196.5.0-1008.85.3.0-1003.35.3.0-1008.95.3.0-1009.105.3.0-1010.115.4.0-1005.55.13.0-1005.65.15.0-1002.44.15.0-1001.15.0.0-1021.24~18.04.15.0.0-1022.25~18.04.15.0.0-1023.26~18.04.15.0.0-1024.27~18.04.15.0.0-1025.285.0.0-1027.305.11.0-1009.9~20.04.25.11.0-1014.15~20.04.15.11.0-1016.17~20.04.15.11.0-1017.18~20.04.15.11.0-1019.20~20.04.15.11.0-1020.21~20.04.25.11.0-1021.22~20.04.25.11.0-1022.23~20.04.15.11.0-1023.24~20.04.15.11.0-1025.27~20.04.1+1 more5.11.0-1028.31~20.04.1Exploitability
AV:LAC:LPR:LUI:NScope
S:CImpact
C:HI:HA:HCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H