{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-50115", "ASSIGNER": "cve@kernel.org", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory\n\nIgnore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits\n4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't\nenforce 32-byte alignment of nCR3.\n\nIn the absolute worst case scenario, failure to ignore bits 4:0 can result\nin an out-of-bounds read, e.g. if the target page is at the end of a\nmemslot, and the VMM isn't using guard pages.\n\nPer the APM:\n\n The CR3 register points to the base address of the page-directory-pointer\n table. The page-directory-pointer table is aligned on a 32-byte boundary,\n with the low 5 address bits 4:0 assumed to be 0.\n\nAnd the SDM's much more explicit:\n\n 4:0 Ignored\n\nNote, KVM gets this right when loading PDPTRs, it's only the nSVM flow\nthat is broken." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Linux", "product": { "product_data": [ { "product_name": "Linux", "version": { "version_data": [ { "version_affected": "<", "version_name": "e4e517b4be01", "version_value": "76ce386feb14" }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "version": "3.2", "status": "affected" }, { "version": "0", "lessThan": "3.2", "status": "unaffected", "versionType": "semver" }, { "version": "5.10.229", "lessThanOrEqual": "5.10.*", "status": "unaffected", "versionType": "semver" }, { "version": "5.15.170", "lessThanOrEqual": "5.15.*", "status": "unaffected", "versionType": "semver" }, { "version": "6.1.115", "lessThanOrEqual": "6.1.*", "status": "unaffected", "versionType": "semver" }, { "version": "6.6.59", "lessThanOrEqual": "6.6.*", "status": "unaffected", "versionType": "semver" }, { "version": "6.11.6", "lessThanOrEqual": "6.11.*", "status": "unaffected", "versionType": "semver" }, { "version": "6.12", "lessThanOrEqual": "*", "status": "unaffected", "versionType": "original_commit_for_fix" } ], "defaultStatus": "affected" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5" }, { "url": "https://git.kernel.org/stable/c/58cb697d80e669c56197f703e188867c8c54c494", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/58cb697d80e669c56197f703e188867c8c54c494" }, { "url": "https://git.kernel.org/stable/c/6876793907cbe19d42e9edc8c3315a21e06c32ae", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/6876793907cbe19d42e9edc8c3315a21e06c32ae" }, { "url": "https://git.kernel.org/stable/c/2c4adc9b192a0815fe58a62bc0709449416cc884", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/2c4adc9b192a0815fe58a62bc0709449416cc884" }, { "url": "https://git.kernel.org/stable/c/426682afec71ea3f889b972d038238807b9443e4", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/426682afec71ea3f889b972d038238807b9443e4" }, { "url": "https://git.kernel.org/stable/c/f559b2e9c5c5308850544ab59396b7d53cfc67bd", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/f559b2e9c5c5308850544ab59396b7d53cfc67bd" } ] }, "generator": { "engine": "bippy-8e903de6a542" } }