In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Make ICC_SGI_EL1 undef in the absence of a vGICv3
On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_SGI_EL1 registers is trapped to EL2.
We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?).
The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46707.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-46707-3db3cbf4",
"target": {
"file": "arch/arm64/kvm/vgic/vgic.h"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"30409287049315908949241698618645750784"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2024-46707-92652dbf",
"target": {
"file": "arch/arm64/kvm/sys_regs.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"273564496415231710053211187707956165550",
"58481554856832252561204972122768136007",
"32628143546116558206957825670019826312",
"34492788508400149310912022696077592902",
"118399541402168175096687518341096758754",
"47637209911078294504913943977337657569",
"338418966284749922019044734835958426224"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2024-46707-efa1f97c",
"target": {
"file": "arch/arm64/kvm/sys_regs.c",
"function": "access_gic_sgi"
},
"digest": {
"length": 477.0,
"function_hash": "135967763791365672509789873617302219842"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@94d4fbad01b19ec5eab3d6b50aaec4f9db8b2d8d"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46707.json"