In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Fix uninitialized memcache pointer in usermemabort()
Commit fce886a60207 ("KVM: arm64: Plumb the pKVM MMU in KVM") made the initialization of the local memcache variable in usermemabort() conditional, leaving a codepath where it is used uninitialized via kvmpgtablestage2_map().
This can fail on any path that requires a stage-2 allocation without transition via a permission fault or dirty logging.
Fix this by making sure that memcache is always valid.
[
    {
        "signature_type": "Line",
        "id": "CVE-2025-37996-203f51ad",
        "target": {
            "file": "arch/arm64/kvm/mmu.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@157dbc4a321f5bb6f8b6c724d12ba720a90f1a7c",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "69666031120562081488402290252911069498",
                "54344594298927433486551814461954678702",
                "105001716935880983028567382602018954231",
                "255777498674459255736828081634927190613",
                "125539676477983577120005362982048626",
                "89690763149274303858606562438877171349",
                "312275967343983192618416825411143289640",
                "231686796399277311033788344234635001843",
                "62729546829049460798364510626055046799",
                "302844728349091177700705063726493098126",
                "303902448900760352504384585839824255724",
                "62374437545604166718928973611909502278"
            ]
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2025-37996-335c813d",
        "target": {
            "function": "user_mem_abort",
            "file": "arch/arm64/kvm/mmu.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a26d50f8a4a5049e956984797b5d0dedea4bbb18",
        "signature_version": "v1",
        "digest": {
            "function_hash": "123498371865048947309567115381901045016",
            "length": 4059.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "id": "CVE-2025-37996-3a37f4c2",
        "target": {
            "function": "user_mem_abort",
            "file": "arch/arm64/kvm/mmu.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@157dbc4a321f5bb6f8b6c724d12ba720a90f1a7c",
        "signature_version": "v1",
        "digest": {
            "function_hash": "123498371865048947309567115381901045016",
            "length": 4059.0
        },
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "id": "CVE-2025-37996-b1be05b8",
        "target": {
            "file": "arch/arm64/kvm/mmu.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a26d50f8a4a5049e956984797b5d0dedea4bbb18",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "69666031120562081488402290252911069498",
                "54344594298927433486551814461954678702",
                "105001716935880983028567382602018954231",
                "255777498674459255736828081634927190613",
                "125539676477983577120005362982048626",
                "89690763149274303858606562438877171349",
                "312275967343983192618416825411143289640",
                "231686796399277311033788344234635001843",
                "62729546829049460798364510626055046799",
                "302844728349091177700705063726493098126",
                "303902448900760352504384585839824255724",
                "62374437545604166718928973611909502278"
            ]
        },
        "deprecated": false
    }
]