CVE-2025-37819

Updated: 2025-11-19 04:02:24.167007

Description:

In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() With ACPI in place, gicv2m_get_fwnode() is registered with the pci subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime during a PCI host bridge probe. But, the call back is wrongly marked as __init, causing it to be freed, while being registered with the PCI subsystem and could trigger: Unable to handle kernel paging request at virtual address ffff8000816c0400 gicv2m_get_fwnode+0x0/0x58 (P) pci_set_bus_msi_domain+0x74/0x88 pci_register_host_bridge+0x194/0x548 This is easily reproducible on a Juno board with ACPI boot. Retain the function for later use.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Not Vulnerable 2025-11-28 07:57:12 Introduced in v6.2 commit d51a15af37ce8 "irqchip/gic-v2m: Mark a few functions __init"
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-08 17:37:50
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-08 17:37:50
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Already Fixed 2025-12-02 17:20:14
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Released CLSA-2025:1757963029 2025-09-16 11:20:45
TuxCare 9.6 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1766488019 2025-12-23 20:10:05
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Needs Triage 2025-11-19 08:41:05
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Not Vulnerable 2025-12-31 07:34:36
Ubuntu 20.04 ELS linux 5.4.0 7.8 HIGH Not Vulnerable 2025-12-31 07:34:36