Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-38158


In the Linux kernel, the following vulnerability has been resolved: hisi_acc_vfio_pci: fix XQE dma address error The dma addresses of EQE and AEQE are wrong after migration and results in guest kernel-mode encryption services failure. Comparing the definition of hardware registers, we found that there was an error when the data read from the register was combined into an address. Therefore, the address combination sequence needs to be corrected. Even after fixing the above problem, we still have an issue where the Guest from an old kernel can get migrated to new kernel and may result in wrong data. In order to ensure that the address is correct after migration, if an old magic number is detected, the dma address needs to be updated.


Published

2025-07-03T09:15:30.890

Last Modified

2025-12-18T20:43:11.200

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 6.1.142 Yes
Operating System linux linux_kernel < 6.6.94 Yes
Operating System linux linux_kernel < 6.12.34 Yes
Operating System linux linux_kernel < 6.15.3 Yes
Operating System debian debian_linux 11.0 Yes

References