一、 漏洞 CVE-2024-53135 基础信息
漏洞标题
KVM:VMX:将 Intel PT 虚拟化(guest/host 模式)置于 CONFIG_BROKEN 之后
来源:AIGC 神龙大模型
漏洞描述信息
N/A
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
来源:AIGC 神龙大模型
漏洞类别
使用共享资源的并发执行不恰当同步问题(竞争条件)
来源:AIGC 神龙大模型
漏洞标题
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
来源:美国国家漏洞数据库 NVD
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN Hide KVM's pt_mode module param behind CONFIG_BROKEN, i.e. disable support for virtualizing Intel PT via guest/host mode unless BROKEN=y. There are myriad bugs in the implementation, some of which are fatal to the guest, and others which put the stability and health of the host at risk. For guest fatalities, the most glaring issue is that KVM fails to ensure tracing is disabled, and *stays* disabled prior to VM-Enter, which is necessary as hardware disallows loading (the guest's) RTIT_CTL if tracing is enabled (enforced via a VMX consistency check). Per the SDM: If the logical processor is operating with Intel PT enabled (if IA32_RTIT_CTL.TraceEn = 1) at the time of VM entry, the "load IA32_RTIT_CTL" VM-entry control must be 0. On the host side, KVM doesn't validate the guest CPUID configuration provided by userspace, and even worse, uses the guest configuration to decide what MSRs to save/load at VM-Enter and VM-Exit. E.g. configuring guest CPUID to enumerate more address ranges than are supported in hardware will result in KVM trying to passthrough, save, and load non-existent MSRs, which generates a variety of WARNs, ToPA ERRORs in the host, a potential deadlock, etc.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Linux kernel 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于KVM虚拟化中Intel PT虚拟化(guest/host模式)的实现中存在多种错误,包括可能导致虚拟机故障和主机稳定性及健康风险的问题。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2024-53135 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2024-53135 的情报信息
  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • 标题: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN - kernel/git/stable/linux.git - Linux kernel stable tree -- 🔗来源链接

    标签:

  • https://nvd.nist.gov/vuln/detail/CVE-2024-53135