In the Linux kernel, the following vulnerability has been resolved:
x86/tdx: Fix data leak in mmio_read()
The mmio_read() function makes a TDVMCALL to retrieve MMIO data for an
address from the VMM.
Sean noticed that mmio_read() unintentionally exposes the value of an
initialized variable (val) on the stack to the VMM.
This variable is only needed as an output value. It did not need to be
passed to the VMM in the first place.
Do not send the original value of *val to the VMM.
[ dhansen: clarify what 'val' is used for. ]
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 20:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/26c6af49d26ffc377e392e30d4086db19eed0ef7 - Patch | |
References | () https://git.kernel.org/stable/c/b55ce742afcb8e8189d82f2f1e635ba1b5a461fa - Patch | |
References | () https://git.kernel.org/stable/c/b6fb565a2d15277896583d471b21bc14a0c99661 - Patch | |
References | () https://git.kernel.org/stable/c/ef00818c50cf55a3a56bd9a9fae867c92dfb84e7 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
CPE | cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 08:15
Updated : 2024-11-20 20:56
NVD link : CVE-2024-46794
Mitre link : CVE-2024-46794
CVE.ORG link : CVE-2024-46794
JSON object : View
Products Affected
linux
- linux_kernel
CWE