2024-09-11 16:00:36 +00:00
{
2024-09-13 08:00:29 +00:00
"data_version" : "4.0" ,
2024-09-11 16:00:36 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-46707" ,
2024-09-13 08:00:29 +00:00
"ASSIGNER" : "cve@kernel.org" ,
"STATE" : "PUBLIC"
2024-09-11 16:00:36 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-09-13 08:00:29 +00:00
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3\n\nOn a system with a GICv3, if a guest hasn't been configured with\nGICv3 and that the host is not capable of GICv2 emulation,\na write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.\n\nWe therefore try to emulate the SGI access, only to hit a NULL\npointer as no private interrupt is allocated (no GIC, remember?).\n\nThe obvious fix is to give the guest what it deserves, in the\nshape of a UNDEF exception."
2024-09-11 16:00:36 +00:00
}
]
2024-09-13 08:00:29 +00:00
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Linux" ,
"product" : {
"product_data" : [
{
"product_name" : "Linux" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "1da177e4c3f4" ,
"version_value" : "15818af2f7aa"
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "5.10.225" ,
"lessThanOrEqual" : "5.10.*" ,
"status" : "unaffected" ,
2024-11-05 10:04:53 +00:00
"versionType" : "semver"
2024-09-13 08:00:29 +00:00
} ,
{
"version" : "5.15.166" ,
"lessThanOrEqual" : "5.15.*" ,
"status" : "unaffected" ,
2024-11-05 10:04:53 +00:00
"versionType" : "semver"
2024-09-13 08:00:29 +00:00
} ,
{
"version" : "6.1.107" ,
"lessThanOrEqual" : "6.1.*" ,
"status" : "unaffected" ,
2024-11-05 10:04:53 +00:00
"versionType" : "semver"
2024-09-13 08:00:29 +00:00
} ,
{
"version" : "6.6.48" ,
"lessThanOrEqual" : "6.6.*" ,
"status" : "unaffected" ,
2024-11-05 10:04:53 +00:00
"versionType" : "semver"
2024-09-13 08:00:29 +00:00
} ,
{
"version" : "6.10.7" ,
"lessThanOrEqual" : "6.10.*" ,
"status" : "unaffected" ,
2024-11-05 10:04:53 +00:00
"versionType" : "semver"
2024-09-13 08:00:29 +00:00
} ,
{
2024-09-15 18:05:01 +00:00
"version" : "6.11" ,
2024-09-13 08:00:29 +00:00
"lessThanOrEqual" : "*" ,
"status" : "unaffected" ,
"versionType" : "original_commit_for_fix"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/stable/c/15818af2f7aa55eff375333cb7689df15d3f24ef" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/15818af2f7aa55eff375333cb7689df15d3f24ef"
} ,
{
"url" : "https://git.kernel.org/stable/c/96b076e8ee5bc3a1126848c8add0f74bd30dc9d1" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/96b076e8ee5bc3a1126848c8add0f74bd30dc9d1"
} ,
{
"url" : "https://git.kernel.org/stable/c/94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d"
} ,
{
"url" : "https://git.kernel.org/stable/c/9d7629bec5c3f80bd0e3bf8103c06a2f7046bd92" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/9d7629bec5c3f80bd0e3bf8103c06a2f7046bd92"
} ,
{
"url" : "https://git.kernel.org/stable/c/2073132f6ed3079369e857a8deb33d11bdd983bc" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/2073132f6ed3079369e857a8deb33d11bdd983bc"
} ,
{
"url" : "https://git.kernel.org/stable/c/3e6245ebe7ef341639e9a7e402b3ade8ad45a19f" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/3e6245ebe7ef341639e9a7e402b3ade8ad45a19f"
}
]
} ,
"generator" : {
2024-11-05 10:04:53 +00:00
"engine" : "bippy-9e1c9544281a"
2024-09-11 16:00:36 +00:00
}
}