-
CVE-2025-38257
- EPSS 0.04%
- Published 09.07.2025 10:42:34
- Last modified 10.07.2025 15:15:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apqn target list entries contained in 'nr_apqns' variable is determined by userspace via an ioctl call so the result of the product in calculation of size passed to memdup_user() may overflow. In this case the actual size of the allocated area and the value describing it won't be in sync leading to various types of unpredictable behaviour later. Use a proper memdup_array_user() helper which returns an error if an overflow is detected. Note that it is different from when nr_apqns is initially zero - that case is considered valid and should be handled in subsequent pkey_handler implementations. Found by Linux Verification Center (linuxtesting.org).
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
ad1bdd24a02d5a8d119af8e4cd50933780a6d29f
Version
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d
Status
affected
Version <
faa1ab4a23c42e34dc000ef4977b751d94d5148c
Version
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d
Status
affected
Version <
88f3869649edbc4a13f6c2877091f81cd5a50f05
Version
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d
Status
affected
Version <
f855b119e62b004a5044ed565f2a2b368c4d3f16
Version
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d
Status
affected
Version <
73483ca7e07a5e39bdf612eec9d3d293e8bef649
Version
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d
Status
affected
Version <
7360ee47599af91a1d5f4e74d635d9408a54e489
Version
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.4
Status
affected
Version <
5.4
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.187
Status
unaffected
Version <=
6.1.*
Version
6.1.143
Status
unaffected
Version <=
6.6.*
Version
6.6.96
Status
unaffected
Version <=
6.12.*
Version
6.12.36
Status
unaffected
Version <=
6.15.*
Version
6.15.5
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.097 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|