In the Linux kernel, the following vulnerability has been resolved:
arm64/pageattr: Propagate return value from __changememorycommon
The rodata=on security measure requires that any code path which does vmalloc -> setmemoryro/setmemoryrox must protect the linear map alias too. Therefore, if such a call fails, we must abort setmemory* and caller must take appropriate action; currently we are suppressing the error, and there is a real chance of such an error arising post commit a166563e7ec3 ("arm64: mm: support large block mapping when rodata=full"). Therefore, propagate any error to the caller.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68737.json",
"cna_assigner": "Linux"
}