Guest VM PCIe Buffer Overrun Enables Host DoS
CVE-2024-21961 Published on February 12, 2026
Improper restriction of operations within the bounds of a memory buffer in PCIe® Link could allow an attacker with access to a guest virtual machine to potentially perform a denial of service attack against the host resulting in loss of availability.
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2024-21961 has been classified to as a Buffer Overflow vulnerability or weakness.
Affected Versions
AMD EPYC™ 7002 Series Processors:- Version No Fix Planned is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1165,1166,1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version Errata #1526 is unaffected.
- Version No fix planned is unaffected.
- Version No fix planned is unaffected.
- Version No fix planned is unaffected.
- Version No fix planned is unaffected.
- Version No fix planned is unaffected.
- Version No fix planned is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.