Executive Summary

Informations
Name CVE-2024-39483 First vendor Publication 2024-07-05
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked

When requesting an NMI window, WARN on vNMI support being enabled if and only if NMIs are actually masked, i.e. if the vCPU is already handling an NMI. KVM's ABI for NMIs that arrive simultanesouly (from KVM's point of view) is to inject one NMI and pend the other. When using vNMI, KVM pends the second NMI simply by setting V_NMI_PENDING, and lets the CPU do the rest (hardware automatically sets V_NMI_BLOCKING when an NMI is injected).

However, if KVM can't immediately inject an NMI, e.g. because the vCPU is in an STI shadow or is running with GIF=0, then KVM will request an NMI window and trigger the WARN (but still function correctly).

Whether or not the GIF=0 case makes sense is debatable, as the intent of KVM's behavior is to provide functionality that is as close to real hardware as possible. E.g. if two NMIs are sent in quick succession, the probability of both NMIs arriving in an STI shadow is infinitesimally low on real hardware, but significantly larger in a virtual environment, e.g. if the vCPU is preempted in the STI shadow. For GIF=0, the argument isn't as clear cut, because the window where two NMIs can collide is much larger in bare metal (though still small).

That said, KVM should not have divergent behavior for the GIF=0 case based on whether or not vNMI support is enabled. And KVM has allowed simultaneous NMIs with GIF=0 for over a decade, since commit 7460fb4a3400 ("KVM: Fix simultaneous NMIs"). I.e. KVM's GIF=0 handling shouldn't be modified without a *really* good reason to do so, and if KVM's behavior were to be modified, it should be done irrespective of vNMI support.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39483

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3670

Sources (Detail)

https://git.kernel.org/stable/c/1d87cf2eba46deaff6142366127f2323de9f84d1
https://git.kernel.org/stable/c/b4bd556467477420ee3a91fbcba73c579669edc6
https://git.kernel.org/stable/c/f79edaf7370986d73d204b36c50cc563a4c0f356
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Date Informations
2025-06-26 02:32:32
  • Multiple Updates
2025-06-25 12:31:51
  • Multiple Updates
2025-06-24 02:37:11
  • Multiple Updates
2025-05-27 02:41:37
  • Multiple Updates
2025-03-29 03:37:55
  • Multiple Updates
2025-03-28 13:43:15
  • Multiple Updates
2025-03-28 03:16:32
  • Multiple Updates
2025-03-19 03:11:56
  • Multiple Updates
2025-03-18 03:24:49
  • Multiple Updates
2025-03-14 03:12:11
  • Multiple Updates
2025-03-06 14:08:35
  • Multiple Updates
2025-02-22 03:22:05
  • Multiple Updates
2025-01-08 03:03:26
  • Multiple Updates
2025-01-07 03:02:59
  • Multiple Updates
2024-12-25 03:01:37
  • Multiple Updates
2024-12-12 03:04:34
  • Multiple Updates
2024-11-25 09:24:15
  • Multiple Updates
2024-11-22 21:23:18
  • Multiple Updates
2024-11-21 21:22:55
  • Multiple Updates
2024-11-20 02:58:13
  • Multiple Updates
2024-11-14 02:58:32
  • Multiple Updates
2024-11-09 02:58:32
  • Multiple Updates
2024-10-26 02:55:56
  • Multiple Updates
2024-10-25 02:57:51
  • Multiple Updates
2024-10-23 02:57:04
  • Multiple Updates
2024-10-03 02:52:24
  • Multiple Updates
2024-10-02 02:50:48
  • Multiple Updates
2024-09-15 02:48:38
  • Multiple Updates
2024-09-12 02:48:11
  • Multiple Updates
2024-09-07 02:47:11
  • Multiple Updates
2024-09-06 02:46:23
  • Multiple Updates
2024-09-04 02:49:36
  • Multiple Updates
2024-08-22 02:47:36
  • Multiple Updates
2024-08-02 13:56:35
  • Multiple Updates
2024-08-02 01:35:49
  • Multiple Updates
2024-07-09 00:27:28
  • Multiple Updates
2024-07-05 17:27:24
  • Multiple Updates
2024-07-05 13:27:27
  • First insertion