๐Ÿ” CVE Alert

CVE-2025-21913

UNKNOWN 0.0

x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() Xen doesn't offer MSR_FAM10H_MMIO_CONF_BASE to all guests. This results in the following warning: unchecked MSR access error: RDMSR from 0xc0010058 at rIP: 0xffffffff8101d19f (xen_do_read_msr+0x7f/0xa0) Call Trace: xen_read_msr+0x1e/0x30 amd_get_mmconfig_range+0x2b/0x80 quirk_amd_mmconfig_area+0x28/0x100 pnp_fixup_device+0x39/0x50 __pnp_add_device+0xf/0x150 pnp_add_device+0x3d/0x100 pnpacpi_add_device_handler+0x1f9/0x280 acpi_ns_get_device_callback+0x104/0x1c0 acpi_ns_walk_namespace+0x1d0/0x260 acpi_get_devices+0x8a/0xb0 pnpacpi_init+0x50/0x80 do_one_initcall+0x46/0x2e0 kernel_init_freeable+0x1da/0x2f0 kernel_init+0x16/0x1b0 ret_from_fork+0x30/0x50 ret_from_fork_asm+0x1b/0x30 based on quirks for a "PNP0c01" device. Treating MMCFG as disabled is the right course of action, so no change is needed there. This was most likely exposed by fixing the Xen MSR accessors to not be silently-safe.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3fac3734c43a2e21fefeb72124d8bd31dff3956f < 0c65d13bdcc54e5b924ebe790f85a7f01bfe1cb1 3fac3734c43a2e21fefeb72124d8bd31dff3956f < 8f43ba5ee498fe037d1570f6868d9aeaf49dda80 3fac3734c43a2e21fefeb72124d8bd31dff3956f < ebf6a763904e42dabeb2e270ceb0bbe0f825d7ae 3fac3734c43a2e21fefeb72124d8bd31dff3956f < 923fede9eae9865af305bcdf8f111e4b62ae4bda 3fac3734c43a2e21fefeb72124d8bd31dff3956f < 14cb5d83068ecf15d2da6f7d0e9ea9edbcbc0457
Linux / Linux
6.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0c65d13bdcc54e5b924ebe790f85a7f01bfe1cb1 git.kernel.org: https://git.kernel.org/stable/c/8f43ba5ee498fe037d1570f6868d9aeaf49dda80 git.kernel.org: https://git.kernel.org/stable/c/ebf6a763904e42dabeb2e270ceb0bbe0f825d7ae git.kernel.org: https://git.kernel.org/stable/c/923fede9eae9865af305bcdf8f111e4b62ae4bda git.kernel.org: https://git.kernel.org/stable/c/14cb5d83068ecf15d2da6f7d0e9ea9edbcbc0457 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html