In the Linux kernel, the following vulnerability has been resolved:
KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls
kvm_xen_schedop_poll does a kmalloc_array() when a VM polls the host
for more than one event channel potr (nr_ports > 1).
After the kmalloc_array(), the error paths need to go through the
"out" label, but the call to kvm_read_guest_virt() does not.
[Adjusted commit message. - Paolo]
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-07-28 12:15
Updated : 2025-11-19 17:58
NVD link : CVE-2025-38469
Mitre link : CVE-2025-38469
CVE.ORG link : CVE-2025-38469
JSON object : View
Products Affected
linux
- linux_kernel
CWE
