CVE-2025-21950

In the Linux kernel, the following vulnerability has been resolved: drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl In the "pmcmd_ioctl" function, three memory objects allocated by kmalloc are initialized by "hcall_get_cpu_state", which are then copied to user space. The initializer is indeed implemented in "acrn_hypercall2" (arch/x86/include/asm/acrn.h). There is a risk of information leakage due to uninitialized bytes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

22 Jan 2026, 20:57

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083 - () https://git.kernel.org/stable/c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083 - Patch
References () https://git.kernel.org/stable/c/4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120 - () https://git.kernel.org/stable/c/4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120 - Patch
References () https://git.kernel.org/stable/c/524f29d78c9bdeb49f31f5b0376a07d2fc5cf563 - () https://git.kernel.org/stable/c/524f29d78c9bdeb49f31f5b0376a07d2fc5cf563 - Patch
References () https://git.kernel.org/stable/c/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb - () https://git.kernel.org/stable/c/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb - Patch
References () https://git.kernel.org/stable/c/a4c21b878f0e237f45209a324c903ea7fb05247d - () https://git.kernel.org/stable/c/a4c21b878f0e237f45209a324c903ea7fb05247d - Patch
References () https://git.kernel.org/stable/c/d7e5031fe3f161c8eb5e84db1540bc4373ed861b - () https://git.kernel.org/stable/c/d7e5031fe3f161c8eb5e84db1540bc4373ed861b - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 20:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers: virt: acrn: hsm: Usar kzalloc para evitar fugas de información en pmcmd_ioctl. En la función "pmcmd_ioctl", tres objetos de memoria asignados por kmalloc se inicializan mediante "hcall_get_cpu_state", que posteriormente se copian al espacio de usuario. El inicializador está implementado en "acrn_hypercall2" (arch/x86/include/asm/acrn.h). Existe riesgo de fuga de información debido a bytes no inicializados.
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2026-01-22 20:57


NVD link : CVE-2025-21950

Mitre link : CVE-2025-21950

CVE.ORG link : CVE-2025-21950


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel