CVE-2025-37966

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2025
Last modified:
17/03/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv: Fix kernel crash due to PR_SET_TAGGED_ADDR_CTRL<br /> <br /> When userspace does PR_SET_TAGGED_ADDR_CTRL, but Supm extension is not<br /> available, the kernel crashes:<br /> <br /> Oops - illegal instruction [#1]<br /> [snip]<br /> epc : set_tagged_addr_ctrl+0x112/0x15a<br /> ra : set_tagged_addr_ctrl+0x74/0x15a<br /> epc : ffffffff80011ace ra : ffffffff80011a30 sp : ffffffc60039be10<br /> [snip]<br /> status: 0000000200000120 badaddr: 0000000010a79073 cause: 0000000000000002<br /> set_tagged_addr_ctrl+0x112/0x15a<br /> __riscv_sys_prctl+0x352/0x73c<br /> do_trap_ecall_u+0x17c/0x20c<br /> andle_exception+0x150/0x15c<br /> <br /> Fix it by checking if Supm is available.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.14.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*