Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-53135— KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN

EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-53135

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN Hide KVM's pt_mode module param behind CONFIG_BROKEN, i.e. disable support for virtualizing Intel PT via guest/host mode unless BROKEN=y. There are myriad bugs in the implementation, some of which are fatal to the guest, and others which put the stability and health of the host at risk. For guest fatalities, the most glaring issue is that KVM fails to ensure tracing is disabled, and *stays* disabled prior to VM-Enter, which is necessary as hardware disallows loading (the guest's) RTIT_CTL if tracing is enabled (enforced via a VMX consistency check). Per the SDM: If the logical processor is operating with Intel PT enabled (if IA32_RTIT_CTL.TraceEn = 1) at the time of VM entry, the "load IA32_RTIT_CTL" VM-entry control must be 0. On the host side, KVM doesn't validate the guest CPUID configuration provided by userspace, and even worse, uses the guest configuration to decide what MSRs to save/load at VM-Enter and VM-Exit. E.g. configuring guest CPUID to enumerate more address ranges than are supported in hardware will result in KVM trying to passthrough, save, and load non-existent MSRs, which generates a variety of WARNs, ToPA ERRORs in the host, a potential deadlock, etc.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于KVM虚拟化中Intel PT虚拟化(guest/host模式)的实现中存在多种错误,包括可能导致虚拟机故障和主机稳定性及健康风险的问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux f99e3daf94ff35dd4a878d32ff66e1fd35223ad6 ~ c3742319d021f5aa3a0a8c828485fee14753f6de -
LinuxLinux 5.0 -

II. Public POCs for CVE-2024-53135

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-53135

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-12-04 · 16 CVEs total

CVE-2024-53125bpf: sync_linked_regs() must preserve subreg_def
CVE-2024-53126vdpa: solidrun: Fix UB bug with devres
CVE-2024-53127Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
CVE-2024-53128sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers
CVE-2024-53129drm/rockchip: vop: Fix a dereferenced before check warning
CVE-2024-53130nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
CVE-2024-53131nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
CVE-2024-53132drm/xe/oa: Fix "Missing outer runtime PM protection" warning
CVE-2024-53133drm/amd/display: Handle dml allocation failure to avoid crash
CVE-2024-53134pmdomain: imx93-blk-ctrl: correct remove path
CVE-2024-53136mm: revert "mm: shmem: fix data-race in shmem_getattr()"
CVE-2024-53138net/mlx5e: kTLS, Fix incorrect page refcounting
CVE-2024-53137ARM: fix cacheflush with PAN
CVE-2024-53139sctp: fix possible UAF in sctp_v6_available()
CVE-2024-53140netlink: terminate outstanding dump on socket close

IV. Related Vulnerabilities

V. Comments for CVE-2024-53135

No comments yet


Leave a comment