In the Linux kernel, the following vulnerability has been resolved:
KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls
kvmxenschedoppoll does a kmallocarray() when a VM polls the host for more than one event channel potr (nr_ports > 1).
After the kmallocarray(), the error paths need to go through the "out" label, but the call to kvmreadguestvirt() does not.
[Adjusted commit message. - Paolo]
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38469.json"
}