CVE-2024-26990
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability has been identified in the Linux kernel related to KVM (Kernel-based Virtual Machine) x86 MMU handling. The issue involves improper write protection of L2 SPTEs (Second-Level Page Table Entries) in TDP MMU (Two-Dimensional Paging Memory Management Unit) when clearing dirty status. This vulnerability was discovered and resolved in May 2024 (NVD).

Technical details

The vulnerability stems from the TDP MMU not properly accounting for role-specific reasons when disabling D-bit dirty logging. Specifically, TDP MMU SPTEs must be write-protected when the TDP MMU is being used to run an L2 (when L1 has disabled EPT) and PML (Page Modification Logging) is enabled. Since KVM always disables PML when running L2, even when L1 and L2 GPAs are in the same domain, failing to write-protect TDP MMU SPTEs results in writes made by L2 not being reflected in the dirty log (Kernel Git).

Impact

When exploited, this vulnerability could lead to incorrect dirty logging behavior in virtualized environments using KVM, particularly affecting nested virtualization scenarios where L2 guests are running. This could potentially impact system stability and the integrity of memory tracking mechanisms (NVD).

Mitigation and workarounds

The issue has been fixed by implementing proper checks using kvmmmupageadneedwriteprotect() when deciding whether to write-protect or clear D-bits on TDP MMU SPTEs. The fix ensures that the TDP MMU correctly accounts for role-specific reasons when handling dirty bit logging (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management