CVE-2025-37849

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Tear down vGIC on failed vCPU creation If kvm_arch_vcpu_create() fails to share the vCPU page with the hypervisor, we propagate the error back to the ioctl but leave the vGIC vCPU data initialised. Note only does this leak the corresponding memory when the vCPU is destroyed but it can also lead to use-after-free if the redistributor device handling tries to walk into the vCPU. Add the missing cleanup to kvm_arch_vcpu_create(), ensuring that the vGIC vCPU structures are destroyed on error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Nov 2025, 12:54

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/07476e0d932afc53c05468076393ac35d0b4999e - () https://git.kernel.org/stable/c/07476e0d932afc53c05468076393ac35d0b4999e - Patch
References () https://git.kernel.org/stable/c/2480326eba8ae9ccc5e4c3c2dc8d407db68e3c52 - () https://git.kernel.org/stable/c/2480326eba8ae9ccc5e4c3c2dc8d407db68e3c52 - Patch
References () https://git.kernel.org/stable/c/250f25367b58d8c65a1b060a2dda037eea09a672 - () https://git.kernel.org/stable/c/250f25367b58d8c65a1b060a2dda037eea09a672 - Patch
References () https://git.kernel.org/stable/c/5085e02362b9948f82fceca979b8f8e12acb1cc5 - () https://git.kernel.org/stable/c/5085e02362b9948f82fceca979b8f8e12acb1cc5 - Patch
References () https://git.kernel.org/stable/c/c322789613407647a05ff5c451a7bf545fb34e73 - () https://git.kernel.org/stable/c/c322789613407647a05ff5c451a7bf545fb34e73 - Patch
References () https://git.kernel.org/stable/c/f1e9087abaeedec9bf2894a282ee4f0d8383f299 - () https://git.kernel.org/stable/c/f1e9087abaeedec9bf2894a282ee4f0d8383f299 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: Desactivación de vGIC al crear una vCPU fallida. Si kvm_arch_vcpu_create() no comparte la página de vCPU con el hipervisor, propagamos el error a ioctl, pero dejamos los datos de vCPU de vGIC inicializados. Cabe destacar que esto solo filtra la memoria correspondiente cuando se destruye la vCPU, sino que también puede provocar un uso después de la liberación si el dispositivo redistribuidor intenta acceder a la vCPU. Agregue la limpieza faltante a kvm_arch_vcpu_create() para garantizar que las estructuras de vCPU de vGIC se destruyan en caso de error.

09 May 2025, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 07:16

Updated : 2025-11-17 12:54


NVD link : CVE-2025-37849

Mitre link : CVE-2025-37849

CVE.ORG link : CVE-2025-37849


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free