First published: Fri May 09 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Reset IRTE to host control if *new* route isn't postable Restore an IRTE back to host control (remapped or posted MSI mode) if the *new* GSI route prevents posting the IRQ directly to a vCPU, regardless of the GSI routing type. Updating the IRTE if and only if the new GSI is an MSI results in KVM leaving an IRTE posting to a vCPU. The dangling IRTE can result in interrupts being incorrectly delivered to the guest, and in the worst case scenario can result in use-after-free, e.g. if the VM is torn down, but the underlying host IRQ isn't freed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37885 has been classified as a moderate severity vulnerability due to its impact on kernel memory management.
To fix CVE-2025-37885, you should update your Linux kernel to the latest stable version that includes the security patch.
CVE-2025-37885 affects multiple versions of the Linux kernel prior to the security patch release.
CVE-2025-37885 is related to KVM and IRQ routing in the Linux kernel.
The potential impacts of CVE-2025-37885 include possible denial of service due to improper handling of interrupt requests.