CVE-2025-37966

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37966
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37966.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-37966
Downstream
Published
2025-05-20T16:47:14Z
Modified
2025-10-22T10:53:09.663396Z
Summary
riscv: Fix kernel crash due to PR_SET_TAGGED_ADDR_CTRL
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: Fix kernel crash due to PRSETTAGGEDADDRCTRL

When userspace does PRSETTAGGEDADDRCTRL, but Supm extension is not available, the kernel crashes:

Oops - illegal instruction [#1] [snip] epc : settaggedaddrctrl+0x112/0x15a ra : settaggedaddrctrl+0x74/0x15a epc : ffffffff80011ace ra : ffffffff80011a30 sp : ffffffc60039be10 [snip] status: 0000000200000120 badaddr: 0000000010a79073 cause: 0000000000000002 settaggedaddrctrl+0x112/0x15a _riscvsysprctl+0x352/0x73c dotrapecallu+0x17c/0x20c andleexception+0x150/0x15c

Fix it by checking if Supm is available.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
09d6775f503b393d0457c7126aa43208e1724004
Fixed
4b595a2f5656cd45d534ed2160c94f7662adefe5
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
09d6775f503b393d0457c7126aa43208e1724004
Fixed
ae08d55807c099357c047dba17624b09414635dd

Affected versions

v6.*

v6.12
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.14.1
v6.14.2
v6.14.3
v6.14.4
v6.14.5
v6.14.6
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.7