CVE-2024-47727

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/tdx: Fix "in-kernel MMIO" check<br /> <br /> TDX only supports kernel-initiated MMIO operations. The handle_mmio()<br /> function checks if the #VE exception occurred in the kernel and rejects<br /> the operation if it did not.<br /> <br /> However, userspace can deceive the kernel into performing MMIO on its<br /> behalf. For example, if userspace can point a syscall to an MMIO address,<br /> syscall does get_user() or put_user() on it, triggering MMIO #VE. The<br /> kernel will treat the #VE as in-kernel MMIO.<br /> <br /> Ensure that the target MMIO address is within the kernel before decoding<br /> instruction.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.19 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.13 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.2 (excluding)