Количество 48
Количество 48

CVE-2024-50115
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.

CVE-2024-50115
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.

CVE-2024-50115
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.

CVE-2024-50115
CVE-2024-50115
In the Linux kernel, the following vulnerability has been resolved: K ...
GHSA-mjgv-4grg-pfrr
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken.

BDU:2025-03127
Уязвимость функции nested_svm_get_tdp_pdptr() модуля arch/x86/kvm/svm/nested.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации.

SUSE-SU-2025:01677-1
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)

SUSE-SU-2025:01669-1
Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)

SUSE-SU-2025:01656-1
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5)

SUSE-SU-2025:01593-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)

SUSE-SU-2025:01692-1
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)

SUSE-SU-2025:01682-1
Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

SUSE-SU-2025:01676-1
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)

SUSE-SU-2025:01668-1
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)

SUSE-SU-2025:01663-1
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)

SUSE-SU-2025:01655-1
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)

SUSE-SU-2025:01652-1
Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6)

SUSE-SU-2025:01610-1
Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

SUSE-SU-2025:01603-1
Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-50115 In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-50115 In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken. | CVSS3: 4.7 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-50115 In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 7.1 | 0% Низкий | 6 месяцев назад | |
CVE-2024-50115 In the Linux kernel, the following vulnerability has been resolved: K ... | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
GHSA-mjgv-4grg-pfrr In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0 can result in an out-of-bounds read, e.g. if the target page is at the end of a memslot, and the VMM isn't using guard pages. Per the APM: The CR3 register points to the base address of the page-directory-pointer table. The page-directory-pointer table is aligned on a 32-byte boundary, with the low 5 address bits 4:0 assumed to be 0. And the SDM's much more explicit: 4:0 Ignored Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow that is broken. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
![]() | BDU:2025-03127 Уязвимость функции nested_svm_get_tdp_pdptr() модуля arch/x86/kvm/svm/nested.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации. | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад |
![]() | SUSE-SU-2025:01677-1 Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | 28 дней назад | ||
![]() | SUSE-SU-2025:01669-1 Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 28 дней назад | ||
![]() | SUSE-SU-2025:01656-1 Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) | 28 дней назад | ||
![]() | SUSE-SU-2025:01593-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:01692-1 Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 27 дней назад | ||
![]() | SUSE-SU-2025:01682-1 Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 28 дней назад | ||
![]() | SUSE-SU-2025:01676-1 Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 28 дней назад | ||
![]() | SUSE-SU-2025:01668-1 Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 28 дней назад | ||
![]() | SUSE-SU-2025:01663-1 Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 28 дней назад | ||
![]() | SUSE-SU-2025:01655-1 Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 28 дней назад | ||
![]() | SUSE-SU-2025:01652-1 Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 28 дней назад | ||
![]() | SUSE-SU-2025:01610-1 Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 30 дней назад | ||
![]() | SUSE-SU-2025:01603-1 Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | около 1 месяца назад |
Уязвимостей на страницу