CVE-2025-37966

Source
https://cve.org/CVERecord?id=CVE-2025-37966
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37966.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37966
Downstream
Published
2025-05-20T16:47:14.815Z
Modified
2026-03-20T12:42:35.617758Z
Summary
riscv: Fix kernel crash due to PR_SET_TAGGED_ADDR_CTRL
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: Fix kernel crash due to PRSETTAGGEDADDRCTRL

When userspace does PRSETTAGGEDADDRCTRL, but Supm extension is not available, the kernel crashes:

Oops - illegal instruction [#1] [snip] epc : settaggedaddrctrl+0x112/0x15a ra : settaggedaddrctrl+0x74/0x15a epc : ffffffff80011ace ra : ffffffff80011a30 sp : ffffffc60039be10 [snip] status: 0000000200000120 badaddr: 0000000010a79073 cause: 0000000000000002 settaggedaddr_ctrl+0x112/0x15a __riscvsysprctl+0x352/0x73c dotrapecallu+0x17c/0x20c andleexception+0x150/0x15c

Fix it by checking if Supm is available.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37966.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
09d6775f503b393d0457c7126aa43208e1724004
Fixed
4b595a2f5656cd45d534ed2160c94f7662adefe5
Fixed
ae08d55807c099357c047dba17624b09414635dd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37966.json"