{"id":"CVE-2024-25742","details":"In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.","modified":"2026-04-02T10:03:56.211550Z","published":"2024-05-17T22:15:07.227Z","related":["ALSA-2024:2758","SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1","SUSE-SU-2024:1641-1","openSUSE-SU-2024:14336-1"],"references":[{"type":"WEB","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9"},{"type":"WEB","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f"},{"type":"WEB","url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6"},{"fixed":"e3ef461af35a8c74f2f4ce6616491ddb355a208f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9"}]}},{"type":"GIT","repo":"https://github.com/torvalds/linux","events":[{"introduced":"0"},{"fixed":"e3ef461af35a8c74f2f4ce6616491ddb355a208f"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25742.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L"}]}