Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-21978

Опубликовано: 05 авг. 2024
Источник: redhat
CVSS3: 6

Описание

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

A flaw was found in the AMD firmware. This vulnerability allows a malicious hypervisor to read or overwrite guest memory, potentially leading to data leakage or data corruption.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7linux-firmwareNot affected
Red Hat Enterprise Linux 8linux-firmwareNot affected
Red Hat Enterprise Linux 9linux-firmwareNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2302919linux-firmware: hw:amd: Improper input validation in SEV-SNP

6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6
nvd
около 1 года назад

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

CVSS3: 6
github
около 1 года назад

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

6 Medium

CVSS3