CVE-2025-21950
📋 TL;DR
This CVE describes an information disclosure vulnerability in the Linux kernel's ACRN hypervisor subsystem. The vulnerability allows uninitialized kernel memory to be leaked to user space through the pmcmd_ioctl function, potentially exposing sensitive data. Systems running affected Linux kernel versions with ACRN hypervisor support are vulnerable.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Sensitive kernel memory contents including passwords, encryption keys, or other privileged data could be exposed to unprivileged users.
Likely Case
Limited information disclosure of kernel memory contents, potentially revealing system state or configuration details.
If Mitigated
No data leakage occurs; user-space receives properly initialized buffers.
🎯 Exploit Status
Exploitation requires local access and ability to call the vulnerable ioctl. No public exploits have been reported.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083, 4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120, 524f29d78c9bdeb49f31f5b0376a07d2fc5cf563, 819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb, a4c21b878f0e237f45209a324c903ea7fb05247d
Vendor Advisory: https://git.kernel.org/stable/c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Rebuild kernel if compiling from source. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable ACRN hypervisor module
linuxPrevent loading of the vulnerable ACRN hypervisor module
echo 'blacklist acrn_hsm' >> /etc/modprobe.d/blacklist-acrn.conf
rmmod acrn_hsm
🧯 If You Can't Patch
- Restrict access to /dev/acrn_hsm device file to trusted users only
- Implement strict access controls and monitoring for users with local system access
🔍 How to Verify
Check if Vulnerable:
Check if ACRN hypervisor module is loaded: lsmod | grep acrn_hsm
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commits: grep -r '1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083' /usr/src/linux
📡 Detection & Monitoring
Log Indicators:
- Unusual ioctl calls to /dev/acrn_hsm device
- Failed attempts to access ACRN hypervisor functionality
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
process.name='acrn_hsm' AND ioctl_call='pmcmd'
🔗 References
- https://git.kernel.org/stable/c/1b8f7a2caa7f9cdfd135e3f78eb9d7e36fb95083
- https://git.kernel.org/stable/c/4e15cf870d2c748e45d45ffc4d5b1dc1b7d50120
- https://git.kernel.org/stable/c/524f29d78c9bdeb49f31f5b0376a07d2fc5cf563
- https://git.kernel.org/stable/c/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb
- https://git.kernel.org/stable/c/a4c21b878f0e237f45209a324c903ea7fb05247d
- https://git.kernel.org/stable/c/d7e5031fe3f161c8eb5e84db1540bc4373ed861b
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html