CVE-2024-57793

5.5 MEDIUM

📋 TL;DR

This vulnerability in the Linux kernel's TDX guest module could allow an untrusted hypervisor to cause memory decryption failures, potentially exposing sensitive data. It affects Confidential Computing (CoCo) virtual machines running on Intel TDX platforms. The issue occurs when the host triggers unrecoverable errors during memory decryption operations.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with TDX guest support before the fix
Operating Systems: Linux distributions with TDX guest support
Default Config Vulnerable: ✅ No
Notes: Only affects systems using Intel TDX (Trust Domain Extensions) for Confidential Computing VMs

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive encrypted guest memory could be leaked to the untrusted hypervisor, potentially exposing cryptographic keys, passwords, or other confidential data.

🟠

Likely Case

Memory corruption or information disclosure within the guest VM, potentially leading to privilege escalation or data leakage.

🟢

If Mitigated

With proper isolation controls and updated kernels, the risk is limited to specific CoCo VM configurations.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires control of the hypervisor and specific TDX guest configurations

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commit 1429ae7b7d4759a1e362456b8911c701bae655b4 or later

Vendor Advisory: https://git.kernel.org/stable/c/1429ae7b7d4759a1e362456b8911c701bae655b4

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commit 2. Reboot the system 3. Verify the patch is applied

🔧 Temporary Workarounds

Disable TDX guest support

linux

Disable Intel TDX guest functionality if not required

modprobe -r tdx_guest
echo 'blacklist tdx_guest' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Isolate TDX guest VMs from untrusted hypervisors
  • Implement additional monitoring for memory access patterns in CoCo environments

🔍 How to Verify

Check if Vulnerable:

Check if TDX guest module is loaded and kernel version is vulnerable: lsmod | grep tdx_guest && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel contains the fix commit: grep -q '1429ae7b7d4759a1e362456b8911c701bae655b4' /proc/version_signature

📡 Detection & Monitoring

Log Indicators:

  • Kernel warnings about set_memory_decrypted failures
  • TDX guest module error messages

SIEM Query:

source="kernel" AND ("tdx_guest" OR "set_memory_decrypted") AND ("error" OR "warning" OR "fail")

🔗 References

📤 Share & Export