CVE-2025-38560
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
22/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
x86/sev: Evict cache lines during SNP memory validation<br />
<br />
An SNP cache coherency vulnerability requires a cache line eviction<br />
mitigation when validating memory after a page state change to private.<br />
The specific mitigation is to touch the first and last byte of each 4K<br />
page that is being validated. There is no need to perform the mitigation<br />
when performing a page state change to shared and rescinding validation.<br />
<br />
CPUID bit Fn8000001F_EBX[31] defines the COHERENCY_SFW_NO CPUID bit<br />
that, when set, indicates that the software mitigation for this<br />
vulnerability is not needed.<br />
<br />
Implement the mitigation and invoke it when validating memory (making it<br />
private) and the COHERENCY_SFW_NO bit is not set, indicating the SNP<br />
guest is vulnerable.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1fb873971e23c35c53823c62809a474a92bc3022
- https://git.kernel.org/stable/c/1fec416c03d0a64cc21aa04ce4aa14254b017e6a
- https://git.kernel.org/stable/c/7b306dfa326f70114312b320d083b21fa9481e1e
- https://git.kernel.org/stable/c/a762a4c8d9e768b538b3cc60615361a8cf377de8
- https://git.kernel.org/stable/c/aed15fc08f15dbb15822b2a0b653f67e76aa0fdf
- https://git.kernel.org/stable/c/f92af52e6dbd8d066d77beba451e0230482dc45b
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



