Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-46848 | First vendor Publication | 2024-09-27 |
Vendor | Cve | Last vendor Modification | 2024-10-04 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 5.5 | ||
Base Score | 5.5 | Environmental Score | 5.5 |
impact SubScore | 3.6 | Temporal Score | 5.5 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Limit the period on Haswell Running the ltp test cve-2015-3290 concurrently reports the following warnings. perfevents: irq loop stuck! Thanks to Thomas Gleixner's analysis, the issue is caused by the low initial period (1) of the frequency estimation algorithm, which triggers the defects of the HW, specifically erratum HSW11 and HSW143. (For the details, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/) The HSW11 requires a period larger than 100 for the INST_RETIRED.ALL event, but the initial period in the freq mode is 1. The erratum is the same as the BDM11, which has been supported in the kernel. A minimum period of 128 is enforced as well on HSW. HSW143 is regarding that the fixed counter 1 may overcount 32 with the Hyper-Threading is enabled. However, based on the test, the hardware has more issues than it tells. Besides the fixed counter 1, the message 'interrupt took too long' can be observed on any counter which was armed with a period < 32 and two events expired in the same NMI. A minimum period of 32 is enforced for the rest of the events. The recommended workaround code of the HSW143 is not implemented. Because it only addresses the issue for the fixed counter. It brings extra overhead through extra MSR writing. No related overcounting issue has been reported so far. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46848 |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-06-26 02:35:12 |
|
2025-06-25 12:33:53 |
|
2025-06-24 02:39:54 |
|
2025-05-27 02:44:07 |
|
2025-03-29 03:40:51 |
|
2025-03-28 13:45:12 |
|
2025-03-28 03:18:53 |
|
2025-03-19 03:14:12 |
|
2025-03-18 03:27:09 |
|
2025-03-14 03:14:26 |
|
2025-03-06 14:10:58 |
|
2025-02-22 03:24:32 |
|
2025-01-08 03:05:32 |
|
2025-01-07 03:05:05 |
|
2024-12-25 03:03:43 |
|
2024-12-12 03:06:39 |
|
2024-11-23 03:03:36 |
|
2024-11-22 03:01:45 |
|
2024-11-20 03:00:04 |
|
2024-11-14 03:00:23 |
|
2024-11-09 03:00:23 |
|
2024-10-26 02:57:45 |
|
2024-10-25 02:59:37 |
|
2024-10-23 02:58:50 |
|
2024-10-04 21:27:35 |
|
2024-09-30 17:27:26 |
|
2024-09-27 17:27:23 |
|