PT-2024-26819 · Linux +5 · Linux Kernel +5

Yihuang Yu

·

Published

2024-04-05

·

Updated

2025-01-16

·

CVE-2024-35980

CVSS v2.0
7.5
VectorAV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions:

Linux kernel (affected versions not specified)

Description:

A vulnerability has been resolved in the Linux kernel related to the arm64: tlb: Fix TLBI RANGE operand. The issue arises when the KVM/arm64 relies on the TLBI RANGE feature to flush TLBs during live migration, but the operand passed to the TLBI RANGE instruction is not correctly sorted out. This leads to a crash on the destination VM after live migration because TLBs are not flushed completely, and some dirty pages are missed. The problem is caused by the commit 117940aa6e5f, which defined `kvm tlb flush vmid range()`. The fix involves extending ` TLBI RANGE NUM()` to support the combination of SCALE#3 and NUM#31.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Integer Underflow

Weakness Enumeration

Related Identifiers

BDU:2025-03072
CVE-2024-35980
MGASA-2024-0263
MGASA-2024-0266
OPENSUSE-SU-2024_3984-1
OPENSUSE-SU-2024_3986-1
OPENSUSE-SU-2024_4315-1
OPENSUSE-SU-2024_4376-1
SUSE-SU-2024:3984-1
SUSE-SU-2024:3986-1
SUSE-SU-2024:4315-1
SUSE-SU-2024:4318-1
SUSE-SU-2024:4364-1
SUSE-SU-2024:4376-1
SUSE-SU-2024:4387-1
USN-6893-1
USN-6893-2
USN-6893-3
USN-6918-1

Affected Products

Astra Linux
Linuxmint
Linux Kernel
Red Os
Suse
Ubuntu