CVE-2024-47727

In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix "in-kernel MMIO" check TDX only supports kernel-initiated MMIO operations. The handle_mmio() function checks if the #VE exception occurred in the kernel and rejects the operation if it did not. However, userspace can deceive the kernel into performing MMIO on its behalf. For example, if userspace can point a syscall to an MMIO address, syscall does get_user() or put_user() on it, triggering MMIO #VE. The kernel will treat the #VE as in-kernel MMIO. Ensure that the target MMIO address is within the kernel before decoding instruction.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2024, 20:32

Type Values Removed Values Added
CWE CWE-754
References () https://git.kernel.org/stable/c/18ecd5b74682839e7cdafb7cd1ec106df7baa18c - () https://git.kernel.org/stable/c/18ecd5b74682839e7cdafb7cd1ec106df7baa18c - Patch
References () https://git.kernel.org/stable/c/4c0c5dcb5471de5fc8f0a1c4980e5815339e1cee - () https://git.kernel.org/stable/c/4c0c5dcb5471de5fc8f0a1c4980e5815339e1cee - Patch
References () https://git.kernel.org/stable/c/25703a3c980e21548774eea8c8a87a75c5c8f58c - () https://git.kernel.org/stable/c/25703a3c980e21548774eea8c8a87a75c5c8f58c - Patch
References () https://git.kernel.org/stable/c/bca2e29f7e26ce7c3522f8b324c0bd85612f68e3 - () https://git.kernel.org/stable/c/bca2e29f7e26ce7c3522f8b324c0bd85612f68e3 - Patch
References () https://git.kernel.org/stable/c/d4fc4d01471528da8a9797a065982e05090e1d81 - () https://git.kernel.org/stable/c/d4fc4d01471528da8a9797a065982e05090e1d81 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-10-23 20:32


NVD link : CVE-2024-47727

Mitre link : CVE-2024-47727


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions