Impact
The vulnerability occurs when the KVM hypervisor copies a flag indicating ID registers are initialized without actually copying the register values for non‑protected VMs. This causes the hypervisor to believe ID registers are ready while they remain zeroed, leading to failed feature checks. As a result, critical system registers such as TCR2_EL1, PIR_EL1, and POR_EL1 are not saved and restored during world switches, which could corrupt the processor state and compromise VM isolation.
Affected Systems
Affected products are the Linux kernel on ARM64, specifically for non‑protected pKVM guests. The exact kernel versions impacted are not disclosed in the available data.
Risk and Exploitability
The EPSS score is below 1%, indicating a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalogue, and a CVSS score is not provided, but the reported impact suggests potential integrity compromise. Based on the description, it is inferred that the attack vector would involve a non‑protected VM or compromised host attempting to use the host‑initialized flag, but no explicit attack path or prerequisites are documented. Overall, the risk is considered moderate due to the potential for state corruption, but the low exploitation probability reduces the urgency.
OpenCVE Enrichment