๐Ÿ” CVE Alert

CVE-2024-50115

HIGH 7.1

KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e4e517b4be019787ada4cbbce2f04570c21b0cbd < 76ce386feb14ec9a460784fcd495d8432acce7a5 e4e517b4be019787ada4cbbce2f04570c21b0cbd < 58cb697d80e669c56197f703e188867c8c54c494 e4e517b4be019787ada4cbbce2f04570c21b0cbd < 6876793907cbe19d42e9edc8c3315a21e06c32ae e4e517b4be019787ada4cbbce2f04570c21b0cbd < 2c4adc9b192a0815fe58a62bc0709449416cc884 e4e517b4be019787ada4cbbce2f04570c21b0cbd < 426682afec71ea3f889b972d038238807b9443e4 e4e517b4be019787ada4cbbce2f04570c21b0cbd < f559b2e9c5c5308850544ab59396b7d53cfc67bd
Linux / Linux
3.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/76ce386feb14ec9a460784fcd495d8432acce7a5 git.kernel.org: https://git.kernel.org/stable/c/58cb697d80e669c56197f703e188867c8c54c494 git.kernel.org: https://git.kernel.org/stable/c/6876793907cbe19d42e9edc8c3315a21e06c32ae git.kernel.org: https://git.kernel.org/stable/c/2c4adc9b192a0815fe58a62bc0709449416cc884 git.kernel.org: https://git.kernel.org/stable/c/426682afec71ea3f889b972d038238807b9443e4 git.kernel.org: https://git.kernel.org/stable/c/f559b2e9c5c5308850544ab59396b7d53cfc67bd lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html