Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2021-47110: Security patch for kernel ((Multiple Advisories))

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Amazon Linux AMI: CVE-2021-47110: Security patch for kernel ((Multiple Advisories))

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/15/2024
Created
06/26/2024
Added
06/24/2024
Modified
07/09/2024

Description

In the Linux kernel, the following vulnerability has been resolved:

x86/kvm: Disable kvmclock on all CPUs on shutdown

Currenly, we disable kvmclock from machine_shutdown() hook and this

only happens for boot CPU. We need to disable it for all CPUs to

guard against memory corruption e.g. on restore from hibernate.

Note, writing '0' to kvmclock MSR doesn't clear memory location, it

just prevents hypervisor from updating the location so for the short

while after write and while CPU is still alive, the clock remains usable

and correct so we don't need to switch to some other clocksource.

Solution(s)

  • amazon-linux-upgrade-kernel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;