In the Linux kernel, the following vulnerability has been resolved: KVM:
SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() Do
the cache flush of converted pages in svm_register_enc_region() before
dropping kvm->lock to fix use-after-free issues where region and/or its
array of pages could be freed by a different task, e.g. if userspace has
__unregister_enc_region_locked() already queued up for the region. Note,
the “obvious” alternative of using local variables doesn’t fully resolve
the bug, as region->pages is also dynamically allocated. I.e. the region
structure itself would be fine, but region->pages could be freed. Flushing
multiple pages under kvm->lock is unfortunate, but the entire flow is a
rare slow path, and the manual flush is only needed on CPUs that lack
coherency for encrypted memory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-116.126 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1065.71 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1065.71~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1068.77 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1068.77~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
git.kernel.org/linus/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 (6.8)
git.kernel.org/stable/c/12f8e32a5a389a5d58afc67728c76e61beee1ad4
git.kernel.org/stable/c/2d13b79640b147bd77c34a5998533b2021a4122d
git.kernel.org/stable/c/4868c0ecdb6cfde7c70cf478c46e06bb9c7e5865
git.kernel.org/stable/c/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
git.kernel.org/stable/c/e126b508ed2e616d679d85fca2fbe77bb48bbdd7
git.kernel.org/stable/c/f6d53d8a2617dd58c89171a6b9610c470ebda38a
launchpad.net/bugs/cve/CVE-2024-35791
nvd.nist.gov/vuln/detail/CVE-2024-35791
security-tracker.debian.org/tracker/CVE-2024-35791
ubuntu.com/security/notices/USN-6898-1
ubuntu.com/security/notices/USN-6898-2
ubuntu.com/security/notices/USN-6898-3
ubuntu.com/security/notices/USN-6898-4
ubuntu.com/security/notices/USN-6917-1
ubuntu.com/security/notices/USN-6919-1
www.cve.org/CVERecord?id=CVE-2024-35791