Critical Vulnerability Information Vulnerability Type: KVM: arm64 - Prevent access to vCPU events before init Description: - KVM incorrectly allows user space to suspend vCPU events before the vCPU is initialized, causing KVM to interpret uninitialized garbage data for routing/injecting exceptions. - In some cases, there is a disagreement between injected code and the hypervisor regarding whether the vCPU has 32-bit EL1, placing the vCPU into an invalid mode in AArch64, triggering a BUG in . Impact: - May lead to system crashes or instability. Relevant Code Location: - Commit Information: - Author: Oliver Upton - Committer: Greg Kroah-Hartman - Commit Date: 2025-09-30 01:52:37 -0700 - Commit Hash: 64a04e6320fc5affbadc59dc7024d79f909bfe84 Example Error Log: