CVE-2025-38469

Source
https://cve.org/CVERecord?id=CVE-2025-38469
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38469.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38469
Downstream
Related
Published
2025-07-28T11:21:30.992Z
Modified
2026-03-09T23:54:06.014245Z
Summary
KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls
Details

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls

kvmxenschedoppoll does a kmallocarray() when a VM polls the host for more than one event channel potr (nr_ports > 1).

After the kmallocarray(), the error paths need to go through the "out" label, but the call to kvmreadguestvirt() does not.

[Adjusted commit message. - Paolo]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38469.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
92c58965e9656dc6e682a8ffe520fac0fb256d13
Fixed
3ee59c38ae7369ad1f7b846e05633ccf0d159fab
Fixed
fd627ac8a5cff4d45269f164b13ddddc0726f2cc
Fixed
061c553c66bc1638c280739999224c8000fd4602
Fixed
5a53249d149f48b558368c5338b9921b76a12f8c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38469.json"