KVM Vulnerability in Linux Kernel Affecting Hyper-V Send IPI Hypercalls
CVE-2025-21779

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
27 February 2025

Summary

A vulnerability in the KVM component of the Linux kernel could allow malicious actors to exploit Hyper-V's SEND_IPI hypercalls. This flaw occurs when the local Advanced Programmable Interrupt Controller (APIC) is not properly managed, leading to potential system crashes or instability. By advertising the support for these hypercalls only when the local APIC is emulated by KVM, the vulnerability is mitigated. It is essential for administrators to ensure they are running an updated version of the Linux kernel to avoid exploitation through this flaw, which could expose systems to severe operational risks.

Affected Version(s)

Linux 214ff83d4473a7757fa18a64dc7efe3b0e158486 < 5393cf22312418262679eaadb130d608c75fe690

Linux 214ff83d4473a7757fa18a64dc7efe3b0e158486 < 874ff13c73c45ecb38cb82191e8c1d523f0dc81b

Linux 214ff83d4473a7757fa18a64dc7efe3b0e158486

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.