Executive Summary

Informations
Name CVE-2025-21779 First vendor Publication 2025-02-27
Vendor Cve Last vendor Modification 2025-04-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel

Advertise support for Hyper-V's SEND_IPI and SEND_IPI_EX hypercalls if and only if the local API is emulated/virtualized by KVM, and explicitly reject said hypercalls if the local APIC is emulated in userspace, i.e. don't rely on userspace to opt-in to KVM_CAP_HYPERV_ENFORCE_CPUID.

Rejecting SEND_IPI and SEND_IPI_EX fixes a NULL-pointer dereference if Hyper-V enlightenments are exposed to the guest without an in-kernel local APIC:

dump_stack+0xbe/0xfd
__kasan_report.cold+0x34/0x84
kasan_report+0x3a/0x50
__apic_accept_irq+0x3a/0x5c0
kvm_hv_send_ipi.isra.0+0x34e/0x820
kvm_hv_hypercall+0x8d9/0x9d0
kvm_emulate_hypercall+0x506/0x7e0
__vmx_handle_exit+0x283/0xb60
vmx_handle_exit+0x1d/0xd0
vcpu_enter_guest+0x16b0/0x24c0
vcpu_run+0xc0/0x550
kvm_arch_vcpu_ioctl_run+0x170/0x6d0
kvm_vcpu_ioctl+0x413/0xb20
__se_sys_ioctl+0x111/0x160
do_syscal1_64+0x30/0x40
entry_SYSCALL_64_after_hwframe+0x67/0xd1

Note, checking the sending vCPU is sufficient, as the per-VM irqchip_mode can't be modified after vCPUs are created, i.e. if one vCPU has an in-kernel local APIC, then all vCPUs have an in-kernel local APIC.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21779

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3713

Sources (Detail)

https://git.kernel.org/stable/c/45fa526b0f5a34492ed0536c3cdf88b78380e4de
https://git.kernel.org/stable/c/5393cf22312418262679eaadb130d608c75fe690
https://git.kernel.org/stable/c/61224533f2b61e252b03e214195d27d64b22989a
https://git.kernel.org/stable/c/874ff13c73c45ecb38cb82191e8c1d523f0dc81b
https://git.kernel.org/stable/c/a8de7f100bb5989d9c3627d3a223ee1c863f3b69
https://git.kernel.org/stable/c/aca8be4403fb90db7adaf63830e27ebe787a76e8
https://git.kernel.org/stable/c/ca29f58ca374c40a0e69c5306fc5c940a0069074
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2025-06-26 02:40:58
  • Multiple Updates
2025-06-25 12:38:02
  • Multiple Updates
2025-06-24 02:45:25
  • Multiple Updates
2025-05-27 02:52:27
  • Multiple Updates
2025-03-29 03:46:31
  • Multiple Updates
2025-03-28 13:49:01
  • Multiple Updates
2025-03-28 03:24:21
  • Multiple Updates
2025-03-25 16:30:09
  • Multiple Updates
2025-03-25 03:30:10
  • Multiple Updates
2025-03-19 00:20:38
  • Multiple Updates
2025-03-18 00:20:41
  • Multiple Updates
2025-03-14 00:21:03
  • Multiple Updates
2025-03-13 21:20:57
  • Multiple Updates
2025-03-13 17:20:53
  • Multiple Updates
2025-02-27 09:20:31
  • First insertion