
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-46830 affects the Linux kernel's KVM (Kernel-based Virtual Machine) x86 subsystem. The vulnerability was discovered in September 2024 and involves improper handling of SRCU (Sleepable Read-Copy Update) locks during KVM_SET_VCPU_EVENTS processing. The issue affects multiple versions of the Linux kernel, including versions from 5.10.97 through 6.10.10 (NVD).
The vulnerability stems from a missing SRCU lock when handling KVM_SET_VCPU_EVENTS in the KVM x86 subsystem. When processing these events, KVM forcibly leaves nested VMX/SVM if SMM mode is being toggled, and leaving nested VMX reads guest memory without proper SRCU protection. The issue has a CVSS v3.1 base score of 7.8 (HIGH) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could potentially lead to privilege escalation, denial of service, or information leaks in systems using KVM virtualization. The high CVSS score indicates significant potential impact on the confidentiality, integrity, and availability of the affected systems (NVD).
The vulnerability has been fixed by adding proper SRCU locking around KVM_SET_VCPU_EVENTS processing. The fix involves using kvm_vcpu_srcu_read_lock() and kvm_vcpu_srcu_read_unlock() to ensure proper synchronization. System administrators should update to patched kernel versions that include the fix (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."