In the Linux kernel, the following vulnerability has been resolved:
drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
In the "pmcmd_ioctl" function, three memory objects allocated by
kmalloc are initialized by "hcall_get_cpu_state", which are then
copied to user space. The initializer is indeed implemented in
"acrn_hypercall2" (arch/x86/include/asm/acrn.h). There is a risk of
information leakage due to uninitialized bytes.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Jan 2026, 20:57
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083 - Patch | |
| References | () https://git.kernel.org/stable/c/4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120 - Patch | |
| References | () https://git.kernel.org/stable/c/524f29d78c9bdeb49f31f5b0376a07d2fc5cf563 - Patch | |
| References | () https://git.kernel.org/stable/c/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb - Patch | |
| References | () https://git.kernel.org/stable/c/a4c21b878f0e237f45209a324c903ea7fb05247d - Patch | |
| References | () https://git.kernel.org/stable/c/d7e5031fe3f161c8eb5e84db1540bc4373ed861b - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
01 Apr 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-01 16:15
Updated : 2026-01-22 20:57
NVD link : CVE-2025-21950
Mitre link : CVE-2025-21950
CVE.ORG link : CVE-2025-21950
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
