
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-39499 affects the Linux kernel's VMCI (Virtual Machine Communication Interface) component. The vulnerability was discovered in July 2024 using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc. The issue involves a lack of sanitization for eventmsg->eventdata.event in the eventdeliver() function, where eventmsg is controlled by user-space (NVD).
The vulnerability exists in the eventdeliver() function of the VMCI component where eventmsg->eventdata.event is passed and used as an index without proper sanitization. This could potentially lead to speculative information leaks. The fix involves adding sanitization using arrayindex_nospec() to ensure the event index is properly bounded (Kernel Commit).
The vulnerability could potentially lead to speculative information leaks when the event index is not properly sanitized. This affects systems running the Linux kernel with the VMCI component enabled (NVD).
The vulnerability has been fixed in multiple Linux kernel versions. The fix involves adding proper sanitization of the event index using arrayindexnospec(). Updates are available for various distributions including Ubuntu 24.04 LTS, 22.04 LTS, and 20.04 LTS (Ubuntu Security), as well as Red Hat Enterprise Linux 9.4 (Red Hat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."