๐Ÿ” CVE Alert

CVE-2025-68737

UNKNOWN 0.0

arm64/pageattr: Propagate return value from __change_memory_common

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: arm64/pageattr: Propagate return value from __change_memory_common The rodata=on security measure requires that any code path which does vmalloc -> set_memory_ro/set_memory_rox must protect the linear map alias too. Therefore, if such a call fails, we must abort set_memory_* and caller must take appropriate action; currently we are suppressing the error, and there is a real chance of such an error arising post commit a166563e7ec3 ("arm64: mm: support large block mapping when rodata=full"). Therefore, propagate any error to the caller.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a166563e7ec375b38a0fd3a58f7b77e50a6bc6a8 < 3e2fc1e57a5361633a4bf4222640c6bfe41ff8ea a166563e7ec375b38a0fd3a58f7b77e50a6bc6a8 < e5efd56fa157d2e7d789949d1d64eccbac18a897
Linux / Linux
6.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3e2fc1e57a5361633a4bf4222640c6bfe41ff8ea git.kernel.org: https://git.kernel.org/stable/c/e5efd56fa157d2e7d789949d1d64eccbac18a897