CVE-2024-50115
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
05/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory<br />
<br />
Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits<br />
4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn&#39;t<br />
enforce 32-byte alignment of nCR3.<br />
<br />
In the absolute worst case scenario, failure to ignore bits 4:0 can result<br />
in an out-of-bounds read, e.g. if the target page is at the end of a<br />
memslot, and the VMM isn&#39;t using guard pages.<br />
<br />
Per the APM:<br />
<br />
The CR3 register points to the base address of the page-directory-pointer<br />
table. The page-directory-pointer table is aligned on a 32-byte boundary,<br />
with the low 5 address bits 4:0 assumed to be 0.<br />
<br />
And the SDM&#39;s much more explicit:<br />
<br />
4:0 Ignored<br />
<br />
Note, KVM gets this right when loading PDPTRs, it&#39;s only the nSVM flow<br />
that is broken.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.2 (including) | 5.10.229 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.170 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.115 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.59 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2c4adc9b192a0815fe58a62bc0709449416cc884
- https://git.kernel.org/stable/c/426682afec71ea3f889b972d038238807b9443e4
- https://git.kernel.org/stable/c/58cb697d80e669c56197f703e188867c8c54c494
- https://git.kernel.org/stable/c/6876793907cbe19d42e9edc8c3315a21e06c32ae
- https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5
- https://git.kernel.org/stable/c/f559b2e9c5c5308850544ab59396b7d53cfc67bd
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



