CVE-2025-38560

5.5 MEDIUM

📋 TL;DR

This CVE addresses a cache coherency vulnerability in the Linux kernel's x86 Secure Encrypted Virtualization (SEV) implementation. It affects systems using AMD Secure Nested Paging (SNP) technology where memory validation after page state changes to private could allow potential information disclosure or data corruption. The vulnerability specifically impacts Linux kernel systems running on AMD EPYC processors with SEV-SNP enabled.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with SEV-SNP support before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions running on AMD EPYC processors with SEV-SNP enabled
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SEV-SNP is enabled and running on affected AMD processors. Most systems are not vulnerable by default as SEV-SNP requires explicit enabling.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with guest VM access could potentially read sensitive data from other VMs or the hypervisor through cache timing side-channels, leading to information disclosure across VM boundaries.

🟠

Likely Case

Information leakage between VMs on the same physical host, potentially exposing sensitive data from one VM to another through cache-based side-channel attacks.

🟢

If Mitigated

With proper mitigation implemented, the cache coherency issue is resolved, preventing cross-VM information leakage through this specific vulnerability vector.

🌐 Internet-Facing: LOW - This vulnerability requires local access to a guest VM and specific hardware/configuration, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - In multi-tenant environments with SEV-SNP enabled, malicious tenants could potentially exploit this to access other tenants' data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to a guest VM, knowledge of cache timing attacks, and specific hardware/software configuration. No public exploits are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 1fb873971e23c35c53823c62809a474a92bc3022 and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/1fb873971e23c35c53823c62809a474a92bc3022

Restart Required: Yes

Instructions:

1. Update to a kernel version containing the fix commits. 2. For distributions: apply security updates from your vendor. 3. Reboot the system to load the new kernel. 4. Verify the fix is applied by checking kernel version or CPUID bit Fn8000001F_EBX[31].

🔧 Temporary Workarounds

Disable SEV-SNP

all

Disable Secure Nested Paging feature if not required, which prevents exploitation of this vulnerability

Modify kernel boot parameters to disable SEV-SNP (specific parameters vary by distribution)

🧯 If You Can't Patch

  • Disable SEV-SNP feature in BIOS/UEFI settings if not required for your workload
  • Isolate VMs with sensitive data on separate physical hosts to prevent cross-VM attacks

🔍 How to Verify

Check if Vulnerable:

Check if SEV-SNP is enabled and CPUID bit Fn8000001F_EBX[31] (COHERENCY_SFW_NO) is not set. Use 'cat /proc/cpuinfo | grep -i sev' and check kernel version.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains the fix commits or check that the mitigation is applied by examining kernel logs for SEV cache mitigation messages.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing SEV memory validation operations
  • System logs indicating SEV-SNP initialization

Network Indicators:

  • No network indicators - this is a local vulnerability

SIEM Query:

Search for kernel panic logs or SEV-related error messages in system logs

🔗 References

📤 Share & Export