CVE-2025-37966
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2025
Last modified:
17/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
riscv: Fix kernel crash due to PR_SET_TAGGED_ADDR_CTRL<br />
<br />
When userspace does PR_SET_TAGGED_ADDR_CTRL, but Supm extension is not<br />
available, the kernel crashes:<br />
<br />
Oops - illegal instruction [#1]<br />
[snip]<br />
epc : set_tagged_addr_ctrl+0x112/0x15a<br />
ra : set_tagged_addr_ctrl+0x74/0x15a<br />
epc : ffffffff80011ace ra : ffffffff80011a30 sp : ffffffc60039be10<br />
[snip]<br />
status: 0000000200000120 badaddr: 0000000010a79073 cause: 0000000000000002<br />
set_tagged_addr_ctrl+0x112/0x15a<br />
__riscv_sys_prctl+0x352/0x73c<br />
do_trap_ecall_u+0x17c/0x20c<br />
andle_exception+0x150/0x15c<br />
<br />
Fix it by checking if Supm is available.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



