CVE-2025-21950

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21950
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21950.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21950
Downstream
Related
Published
2025-04-01T15:41:10.949Z
Modified
2025-11-28T02:34:38.445653Z
Summary
drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl

In the "pmcmdioctl" function, three memory objects allocated by kmalloc are initialized by "hcallgetcpustate", which are then copied to user space. The initializer is indeed implemented in "acrn_hypercall2" (arch/x86/include/asm/acrn.h). There is a risk of information leakage due to uninitialized bytes.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21950.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3d679d5aec648f50e645702929890b9611998a0b
Fixed
4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120
Fixed
524f29d78c9bdeb49f31f5b0376a07d2fc5cf563
Fixed
d7e5031fe3f161c8eb5e84db1540bc4373ed861b
Fixed
1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083
Fixed
a4c21b878f0e237f45209a324c903ea7fb05247d
Fixed
819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.12.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.131
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.83
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.19
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.7