First published: Thu May 30 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails In CoCo VMs it is possible for the untrusted host to cause set_memory_encrypted() or set_memory_decrypted() to fail such that an error is returned and the resulting memory is shared. Callers need to take care to handle these errors to avoid returning decrypted (shared) memory to the page allocator, which could lead to functional or security issues. VMBus code could free decrypted pages if set_memory_encrypted()/decrypted() fails. Leak the pages if this happens.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.31 | |
Linux Kernel | >=6.7<6.8.10 | |
Linux Kernel | =6.9-rc1 | |
Linux Kernel | =6.9-rc2 | |
Linux Kernel | =6.9-rc3 | |
debian/linux | <=6.1.129-1<=6.1.135-1 | 5.10.223-1 5.10.234-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36913 has a severity rating that indicates potential risks associated with memory management in the Linux kernel.
To fix CVE-2024-36913, upgrade to the patched versions: 6.12.11-1 or 6.12.12-1 in your Debian package.
CVE-2024-36913 affects specific versions of the Linux kernel, particularly within certain Debian packages.
CVE-2024-36913 is classified as a memory management vulnerability related to the handling of encrypted memory.
Currently, there is no widely recommended workaround for CVE-2024-36913; the best action is to apply the necessary updates.