CVE-2024-47727Improper Check for Unusual or Exceptional Conditions in Linux

Severity
7.8HIGHNVD
OSV8.8
EPSS
0.0%
top 97.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 21
Latest updateApr 1

Description

In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix "in-kernel MMIO" check TDX only supports kernel-initiated MMIO operations. The handle_mmio() function checks if the #VE exception occurred in the kernel and rejects the operation if it did not. However, userspace can deceive the kernel into performing MMIO on its behalf. For example, if userspace can point a syscall to an MMIO address, syscall does get_user() or put_user() on it, triggering MMIO #VE. The kernel w

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

Patches

🔴Vulnerability Details

16
OSV
linux-azure-6.8 vulnerabilities2025-04-01
OSV
linux-hwe-6.8 vulnerabilities2025-04-01
OSV
linux-azure vulnerabilities2025-03-27
OSV
linux-oem-6.8 vulnerabilities2025-03-27
OSV
linux-ibm vulnerabilities2025-03-27

📋Vendor Advisories

17
Ubuntu
Linux kernel (Azure) vulnerabilities2025-04-01
Ubuntu
Linux kernel (HWE) vulnerabilities2025-04-01
Ubuntu
Linux kernel (IBM) vulnerabilities2025-03-27
Ubuntu
Linux kernel (Azure) vulnerabilities2025-03-27
Ubuntu
Linux kernel (OEM) vulnerabilities2025-03-27
CVE-2024-47727 — Linux vulnerability | cvebase