Sub-page Permission/CVE-2024-36242/INTEL-SA-01196

ID 838615
Updated 11/12/2024
Version 1.0
Public

Key Takeaways

  • Intel has discovered potential issues with the Sub-page Permission (SPP) feature on some Intel processors. These issues pose no security risk, but in virtualized environments, Intel recommends discontinuing SPP support in all cases.

  • Intel plans to discontinue SPP entirely on future processors. No actions are required in non-virtualized environments or in environments where SPP is not used.

author-image

By

Disclosure Date: November 2024
Publication Date: November 2024

Severity Rating: 8.8 High
Industy-wide severity ratings can be found in the National Vulnerability Database

Related Content

 

Intel researchers have discovered potential security issues with the Sub-page Permission (SPP) feature when enabled on some Intel processors. Intel is not aware of any mainstream usage of SPP, and these issues pose no security risk. CVE-2024-36242 has been assigned with a CVSS base score of 8.8 (High) CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H and applies to Performance-core (P-core) processors. CVE-2024-38660 has been assigned with a CVSS base score of 3.8 (Low) CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N and applies to Efficient-core (E-core) processors.

In virtualized environments, Intel recommends that Virtual Machine Monitor (VMM, hypervisor) software should mitigate these issues by discontinuing SPP support in all cases. Intel plans to discontinue SPP entirely on future processors. No actions are required in non-virtualized environments or in environments where SPP is not used.

Intel SPP is a feature designed to enhance the control of memory access in virtualized environments. It operates at a finer granularity than traditional page-level protection mechanisms.

When a VMM enables Intel SPP on some Intel processors, a malicious guest operating system (OS) may be able to write to guest physical addresses that are marked as not writable by the VMM. For CVE-2024-36242, this may apply to any guest physical address. For CVE-2024-38660, this applies only to the specific 4K regions where the hypervisor is using SPP. Both of these issues require the VMM to have specifically enabled the sub-page write permissions for EPT VM-execution control and mapped at least one SPP-enabled page into the guest physical address space. Intel does not believe that any mainstream VMM enables this configuration and is not aware of any mainstream usage of SPP.

Intel recommends that the Sub-Page Permission feature be disabled. As Intel is not aware of any mainstream software that enables SPP, this mitigation may already be in place for most users.

Affected Processors

Refer to the 2022-2024 tab of the consolidated Affected Processors tableSub-page Permission column. Processors which have reached their End Of Servicing Lifetime are not listed in the consolidated table. Intel does not plan to evaluate whether any such processors are affected. Refer to the Support page for more information.

References