In the Linux kernel, the following vulnerability has been resolved:
drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
In the "pmcmd_ioctl" function, three memory objects allocated by
kmalloc are initialized by "hcall_get_cpu_state", which are then
copied to user space. The initializer is indeed implemented in
"acrn_hypercall2" (arch/x86/include/asm/acrn.h). There is a risk of
information leakage due to uninitialized bytes.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-04-01 16:15
Updated : 2026-01-22 20:57
NVD link : CVE-2025-21950
Mitre link : CVE-2025-21950
CVE.ORG link : CVE-2025-21950
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
