-
CVE-2025-38366
- EPSS 0.03%
- Published 25.07.2025 13:15:25
- Last modified 25.07.2025 15:29:19
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Check validity of "num_cpu" from user space The maximum supported cpu number is EIOINTC_ROUTE_MAX_VCPUS about irqchip EIOINTC, here add validation about cpu number to avoid array pointer overflow.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
a3293b4078ee93174f70f36d3ab7618554ce6ab6
Version
1ad7efa552fd5cf4e8c49fea863c5c6a5dcf9f00
Status
affected
Version <
cc8d5b209e09d3b52bca1ffe00045876842d96ae
Version
1ad7efa552fd5cf4e8c49fea863c5c6a5dcf9f00
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.13
Status
affected
Version <
6.13
Version
0
Status
unaffected
Version <=
6.15.*
Version
6.15.5
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.064 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|