CVE-2024-47727
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/tdx: Fix "in-kernel MMIO" check<br />
<br />
TDX only supports kernel-initiated MMIO operations. The handle_mmio()<br />
function checks if the #VE exception occurred in the kernel and rejects<br />
the operation if it did not.<br />
<br />
However, userspace can deceive the kernel into performing MMIO on its<br />
behalf. For example, if userspace can point a syscall to an MMIO address,<br />
syscall does get_user() or put_user() on it, triggering MMIO #VE. The<br />
kernel will treat the #VE as in-kernel MMIO.<br />
<br />
Ensure that the target MMIO address is within the kernel before decoding<br />
instruction.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/18ecd5b74682839e7cdafb7cd1ec106df7baa18c
- https://git.kernel.org/stable/c/25703a3c980e21548774eea8c8a87a75c5c8f58c
- https://git.kernel.org/stable/c/4c0c5dcb5471de5fc8f0a1c4980e5815339e1cee
- https://git.kernel.org/stable/c/bca2e29f7e26ce7c3522f8b324c0bd85612f68e3
- https://git.kernel.org/stable/c/d4fc4d01471528da8a9797a065982e05090e1d81
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



