Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-39483— KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked

EPSS 0.03% · P8

Affected Version Matrix 8

VendorProductVersion RangeStatus
LinuxLinuxfa4c027a7956f5e07697bfcb580d25eeb8471257< f79edaf7370986d73d204b36c50cc563a4c0f356affected
fa4c027a7956f5e07697bfcb580d25eeb8471257< 1d87cf2eba46deaff6142366127f2323de9f84d1affected
fa4c027a7956f5e07697bfcb580d25eeb8471257< b4bd556467477420ee3a91fbcba73c579669edc6affected
6.4affected
< 6.4unaffected
6.6.34≤ 6.6.*unaffected
6.9.5≤ 6.9.*unaffected
6.10≤ *unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-39483

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked When requesting an NMI window, WARN on vNMI support being enabled if and only if NMIs are actually masked, i.e. if the vCPU is already handling an NMI. KVM's ABI for NMIs that arrive simultanesouly (from KVM's point of view) is to inject one NMI and pend the other. When using vNMI, KVM pends the second NMI simply by setting V_NMI_PENDING, and lets the CPU do the rest (hardware automatically sets V_NMI_BLOCKING when an NMI is injected). However, if KVM can't immediately inject an NMI, e.g. because the vCPU is in an STI shadow or is running with GIF=0, then KVM will request an NMI window and trigger the WARN (but still function correctly). Whether or not the GIF=0 case makes sense is debatable, as the intent of KVM's behavior is to provide functionality that is as close to real hardware as possible. E.g. if two NMIs are sent in quick succession, the probability of both NMIs arriving in an STI shadow is infinitesimally low on real hardware, but significantly larger in a virtual environment, e.g. if the vCPU is preempted in the STI shadow. For GIF=0, the argument isn't as clear cut, because the window where two NMIs can collide is much larger in bare metal (though still small). That said, KVM should not have divergent behavior for the GIF=0 case based on whether or not vNMI support is enabled. And KVM has allowed simultaneous NMIs with GIF=0 for over a decade, since commit 7460fb4a3400 ("KVM: Fix simultaneous NMIs"). I.e. KVM's GIF=0 handling shouldn't be modified without a *really* good reason to do so, and if KVM's behavior were to be modified, it should be done irrespective of vNMI support.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux fa4c027a7956f5e07697bfcb580d25eeb8471257 ~ f79edaf7370986d73d204b36c50cc563a4c0f356 -
LinuxLinux 6.4 -

II. Public POCs for CVE-2024-39483

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-39483

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-07-05 · 14 CVEs total

CVE-2024-39485media: v4l: async: Properly re-initialise notifier entry in unregister
CVE-2024-39484mmc: davinci: Don't strip remove function when driver is builtin
CVE-2024-39482bcache: fix variable length array abuse in btree_iter
CVE-2024-39481media: mc: Fix graph walk in media_pipeline_start
CVE-2024-39479drm/i915/hwmon: Get rid of devm
CVE-2024-39480kdb: Fix buffer overflow during tab-complete
CVE-2024-39478crypto: starfive - Do not free stack buffer
CVE-2024-39476md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING
CVE-2024-39477mm/hugetlb: do not call vma_add_reservation upon ENOMEM
CVE-2024-39475fbdev: savage: Handle err return when savagefb_check_var failed
CVE-2024-39474mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL
CVE-2024-39473ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension
CVE-2024-39472xfs: fix log recovery buffer allocation for the legacy h_size fixup

IV. Related Vulnerabilities

V. Comments for CVE-2024-39483

No comments yet


Leave a comment