{"id":"CVE-2025-21950","summary":"drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl\n\nIn the \"pmcmd_ioctl\" function, three memory objects allocated by\nkmalloc are initialized by \"hcall_get_cpu_state\", which are then\ncopied to user space. The initializer is indeed implemented in\n\"acrn_hypercall2\" (arch/x86/include/asm/acrn.h). There is a risk of\ninformation leakage due to uninitialized bytes.","modified":"2026-04-02T12:45:17.638057Z","published":"2025-04-01T15:41:10.949Z","related":["SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21950.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120"},{"type":"WEB","url":"https://git.kernel.org/stable/c/524f29d78c9bdeb49f31f5b0376a07d2fc5cf563"},{"type":"WEB","url":"https://git.kernel.org/stable/c/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a4c21b878f0e237f45209a324c903ea7fb05247d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7e5031fe3f161c8eb5e84db1540bc4373ed861b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21950.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21950"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3d679d5aec648f50e645702929890b9611998a0b"},{"fixed":"4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120"},{"fixed":"524f29d78c9bdeb49f31f5b0376a07d2fc5cf563"},{"fixed":"d7e5031fe3f161c8eb5e84db1540bc4373ed861b"},{"fixed":"1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083"},{"fixed":"a4c21b878f0e237f45209a324c903ea7fb05247d"},{"fixed":"819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21950.json"}}],"schema_version":"1.7.5"}