Vulnerability Description
In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef4
- https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef4
- https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
FAQ
What is CVE-2024-25742?
CVE-2024-25742 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
How severe is CVE-2024-25742?
CVE-2024-25742 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-25742?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.