CVE-2024-21978

Severity
7.9HIGH
EPSS
1.6%
top 17.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 5

Description

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NExploitability: 0.8 | Impact: 5.2

Affected Packages90 packages

NVDamd/epyc_7203_firmware< milanpi_1.0.0.d
NVDamd/epyc_72f3_firmware< milanpi_1.0.0.d
NVDamd/epyc_7303_firmware< milanpi_1.0.0.d
NVDamd/epyc_7313_firmware< milanpi_1.0.0.d
NVDamd/epyc_7343_firmware< milanpi_1.0.0.d

🔴Vulnerability Details

2
CVEList
CVE-2024-21978: Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data2024-08-05
GHSA
GHSA-rf8m-mggj-3g74: Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data2024-08-05

📋Vendor Advisories

1
Red Hat
linux-firmware: hw:amd: Improper input validation in SEV-SNP2024-08-05
CVE-2024-21978 (HIGH CVSS 7.9) | Improper input validation in SEV-SN | cvebase.io