CVE-2024-56161
Published: February 5, 2025Last modified: July 2, 2025
Description
Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.2 |
Attack Vector | LOCAL |
Attack complexity | HIGH |
Privileges required | HIGH |
User interaction | NONE |
Scope | CHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | NONE |
Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-firmware | Unknown (20221109-r0) |
Stream | linux-firmware | Unknown (20230625-r0) |
References
- http://www.openwall.com/lists/oss-security/2025/02/04/1
- http://www.openwall.com/lists/oss-security/2025/03/06/2
- https://lists.debian.org/debian-lts-announce/2025/03/msg00024.html
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html