First published: Wed May 15 2024(Updated: )
In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | <=6.9 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25743 is considered a high severity vulnerability that allows an untrusted hypervisor to inject virtual interrupts.
CVE-2024-25743 can trigger the SIGFPE signal handler in userspace applications, potentially leading to unexpected behavior.
CVE-2024-25743 affects the Linux kernel versions up to and including 6.9.
Mitigation measures for CVE-2024-25743 include upgrading to a patched version of the Linux kernel.
Yes, CVE-2024-25743 specifically affects systems utilizing AMD SEV-SNP and AMD SEV-ES technology.