First published: Fri May 09 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: arm64: mops: Do not dereference src reg for a set operation The source register is not used for SET* and reading it can result in a UBSAN out-of-bounds array access error, specifically when the MOPS exception is taken from a SET* sequence with XZR (reg 31) as the source. Architecturally this is the only case where a src/dst/size field in the ESR can be reported as 31. Prior to 2de451a329cf662b the code in do_el0_mops() was benign as the use of pt_regs_read_reg() prevented the out-of-bounds access.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2de451a329cf662b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37846 has a high severity rating due to the risk of potential out-of-bounds access in the Linux kernel.
To fix CVE-2025-37846, update the Linux kernel to the latest version that includes the patch.
CVE-2025-37846 affects versions of the Linux kernel prior to 2de451a329cf662b.
The potential impacts of CVE-2025-37846 include application crashes and security vulnerabilities due to out-of-bounds access.
Yes, CVE-2025-37846 specifically affects the arm64 architecture within the Linux kernel.