Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-25744

Опубликовано: 12 фев. 2024
Источник: debian
EPSS Низкий

Описание

In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.6.8-1package
linuxfixed6.1.69-1bookwormpackage
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://git.kernel.org/linus/b82a8dbd3d2f4563156f7150c6f2ecab6e960b30 (6.7-rc5)

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.

CVSS3: 5.6
redhat
больше 1 года назад

In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.

CVSS3: 8.8
nvd
больше 1 года назад

In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.

CVSS3: 8.8
github
больше 1 года назад

In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.

oracle-oval
около 1 месяца назад

ELSA-2025-20320: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 14%
0.00045
Низкий