CVE-2024-50115

In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 19:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
References () https://git.kernel.org/stable/c/6876793907cbe19d42e9edc8c3315a21e06c32ae - () https://git.kernel.org/stable/c/6876793907cbe19d42e9edc8c3315a21e06c32ae - Patch
References () https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5 - () https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5 - Patch
References () https://git.kernel.org/stable/c/2c4adc9b192a0815fe58a62bc0709449416cc884 - () https://git.kernel.org/stable/c/2c4adc9b192a0815fe58a62bc0709449416cc884 - Patch
References () https://git.kernel.org/stable/c/426682afec71ea3f889b972d038238807b9443e4 - () https://git.kernel.org/stable/c/426682afec71ea3f889b972d038238807b9443e4 - Patch
References () https://git.kernel.org/stable/c/58cb697d80e669c56197f703e188867c8c54c494 - () https://git.kernel.org/stable/c/58cb697d80e669c56197f703e188867c8c54c494 - Patch
References () https://git.kernel.org/stable/c/f559b2e9c5c5308850544ab59396b7d53cfc67bd - () https://git.kernel.org/stable/c/f559b2e9c5c5308850544ab59396b7d53cfc67bd - Patch
First Time Linux
Linux linux Kernel
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5 -

05 Nov 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-05 18:15

Updated : 2024-11-08 19:14


NVD link : CVE-2024-50115

Mitre link : CVE-2024-50115


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read