CVE-2024-46794

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-46794
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46794.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46794
Downstream
Related
Published
2024-09-18T07:12:49Z
Modified
2025-10-17T12:29:58.045265Z
Summary
x86/tdx: Fix data leak in mmio_read()
Details

In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Fix data leak in mmio_read()

The mmio_read() function makes a TDVMCALL to retrieve MMIO data for an address from the VMM.

Sean noticed that mmio_read() unintentionally exposes the value of an initialized variable (val) on the stack to the VMM.

This variable is only needed as an output value. It did not need to be passed to the VMM in the first place.

Do not send the original value of *val to the VMM.

[ dhansen: clarify what 'val' is used for. ]

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
31d58c4e557d46fa7f8557714250fb6f89c941ae
Fixed
26c6af49d26ffc377e392e30d4086db19eed0ef7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
31d58c4e557d46fa7f8557714250fb6f89c941ae
Fixed
ef00818c50cf55a3a56bd9a9fae867c92dfb84e7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
31d58c4e557d46fa7f8557714250fb6f89c941ae
Fixed
b55ce742afcb8e8189d82f2f1e635ba1b5a461fa
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
31d58c4e557d46fa7f8557714250fb6f89c941ae
Fixed
b6fb565a2d15277896583d471b21bc14a0c99661

Affected versions

v5.*

v5.18
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.100
v6.1.101
v6.1.102
v6.1.103
v6.1.104
v6.1.105
v6.1.106
v6.1.107
v6.1.108
v6.1.109
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.40
v6.1.41
v6.1.42
v6.1.43
v6.1.44
v6.1.45
v6.1.46
v6.1.47
v6.1.48
v6.1.49
v6.1.5
v6.1.50
v6.1.51
v6.1.52
v6.1.53
v6.1.54
v6.1.55
v6.1.56
v6.1.57
v6.1.58
v6.1.59
v6.1.6
v6.1.60
v6.1.61
v6.1.62
v6.1.63
v6.1.64
v6.1.65
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.7
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.8
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.9
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.10.1
v6.10.2
v6.10.3
v6.10.4
v6.10.5
v6.10.6
v6.10.7
v6.10.8
v6.10.9
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "id": "CVE-2024-46794-10db7a6b",
        "signature_version": "v1",
        "target": {
            "function": "mmio_read",
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "length": 335.0,
            "function_hash": "54463444951211368130729671755142357955"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b55ce742afcb8e8189d82f2f1e635ba1b5a461fa",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-4670725e",
        "signature_version": "v1",
        "target": {
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "101696689490902000001513527168559207449",
                "123492621496131816570662921087458499318",
                "157959169044268421338970007069837022545",
                "269671921466016615720730552004379991678"
            ]
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@26c6af49d26ffc377e392e30d4086db19eed0ef7",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-5a794a01",
        "signature_version": "v1",
        "target": {
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "101696689490902000001513527168559207449",
                "123492621496131816570662921087458499318",
                "35991068781066618736201148758295893014",
                "299597035318382847088325415657391535104"
            ]
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b6fb565a2d15277896583d471b21bc14a0c99661",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-5fd4d87a",
        "signature_version": "v1",
        "target": {
            "function": "mmio_read",
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "length": 335.0,
            "function_hash": "54463444951211368130729671755142357955"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b6fb565a2d15277896583d471b21bc14a0c99661",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-78e931a7",
        "signature_version": "v1",
        "target": {
            "function": "mmio_read",
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "length": 358.0,
            "function_hash": "196941188969675234864410861503613168977"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@26c6af49d26ffc377e392e30d4086db19eed0ef7",
        "signature_type": "Function"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-7efa15c0",
        "signature_version": "v1",
        "target": {
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "101696689490902000001513527168559207449",
                "123492621496131816570662921087458499318",
                "35991068781066618736201148758295893014",
                "299597035318382847088325415657391535104"
            ]
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b55ce742afcb8e8189d82f2f1e635ba1b5a461fa",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-af00a20a",
        "signature_version": "v1",
        "target": {
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "101696689490902000001513527168559207449",
                "123492621496131816570662921087458499318",
                "106850150273509142110302881950684483806",
                "157500519121676318814544595229565600674"
            ]
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef00818c50cf55a3a56bd9a9fae867c92dfb84e7",
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "id": "CVE-2024-46794-ba2d3973",
        "signature_version": "v1",
        "target": {
            "function": "mmio_read",
            "file": "arch/x86/coco/tdx/tdx.c"
        },
        "digest": {
            "length": 335.0,
            "function_hash": "54463444951211368130729671755142357955"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ef00818c50cf55a3a56bd9a9fae867c92dfb84e7",
        "signature_type": "Function"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.1.110
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.51
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.10