In the Linux kernel, the following vulnerability has been resolved: KVM:
arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
vgic_v2_parse_attr() is responsible for finding the vCPU that matches the
user-provided CPUID, which (of course) may not be valid. If the ID is
invalid, kvm_get_vcpu_by_id() returns NULL, which isn’t handled gracefully.
Similar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id() actually
returns something and fail the ioctl if not.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/6ddb4f372fc63210034b903d96ebbeb3c7195adb (6.9-rc7)
git.kernel.org/stable/c/01981276d64e542c177b243f7c979fee855d5487
git.kernel.org/stable/c/17db92da8be5dd3bf63c01f4109fe47db64fc66f
git.kernel.org/stable/c/3a5b0378ac6776c7c31b18e0f3c1389bd6005e80
git.kernel.org/stable/c/4404465a1bee3607ad90a4c5f9e16dfd75b85728
git.kernel.org/stable/c/6ddb4f372fc63210034b903d96ebbeb3c7195adb
git.kernel.org/stable/c/8d6a1c8e3de36cb0f5e866f1a582b00939e23104
launchpad.net/bugs/cve/CVE-2024-36953
nvd.nist.gov/vuln/detail/CVE-2024-36953
security-tracker.debian.org/tracker/CVE-2024-36953
www.cve.org/CVERecord?id=CVE-2024-36953