In the Linux kernel, the following vulnerability has been resolved:
riscv: Fix kernel crash due to PR_SET_TAGGED_ADDR_CTRL
When userspace does PR_SET_TAGGED_ADDR_CTRL, but Supm extension is not
available, the kernel crashes:
Oops - illegal instruction [#1]
[snip]
epc : set_tagged_addr_ctrl+0x112/0x15a
ra : set_tagged_addr_ctrl+0x74/0x15a
epc : ffffffff80011ace ra : ffffffff80011a30 sp : ffffffc60039be10
[snip]
status: 0000000200000120 badaddr: 0000000010a79073 cause: 0000000000000002
set_tagged_addr_ctrl+0x112/0x15a
__riscv_sys_prctl+0x352/0x73c
do_trap_ecall_u+0x17c/0x20c
andle_exception+0x150/0x15c
Fix it by checking if Supm is available.
References
Configurations
Configuration 1 (hide)
|
History
27 Jan 2026, 19:08
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo CWE-668 |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/4b595a2f5656cd45d534ed2160c94f7662adefe5 - Patch | |
| References | () https://git.kernel.org/stable/c/ae08d55807c099357c047dba17624b09414635dd - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| Summary |
|
20 May 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-20 17:15
Updated : 2026-01-27 19:08
NVD link : CVE-2025-37966
Mitre link : CVE-2025-37966
CVE.ORG link : CVE-2025-37966
JSON object : View
Products Affected
linux
- linux_kernel
CWE
