Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix uninitialized memcache pointer in user_mem_abort() Commit fce886a60207 ("KVM: arm64: Plumb the pKVM MMU in KVM") made the initialization of the local memcache variable in user_mem_abort() conditional, leaving a codepath where it is used uninitialized via kvm_pgtable_stage2_map(). This can fail on any path that requires a stage-2 allocation without transition via a permission fault or dirty logging. Fix this by making sure that memcache is always valid.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.14, < 6.14.7 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/157dbc4a321f5bb6f8b6c724d12ba720a90f1a7cPatch
- https://git.kernel.org/stable/c/a26d50f8a4a5049e956984797b5d0dedea4bbb18Patch
FAQ
What is CVE-2025-37996?
CVE-2025-37996 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Fix uninitialized memcache pointer in user_mem_abort() Commit fce886a60207 ("KVM: arm64: Plumb the pKVM MMU in KVM") m...
How severe is CVE-2025-37996?
CVE-2025-37996 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-37996?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.