-
CVE-2025-38415
- EPSS 0.04%
- Published 25.07.2025 14:15:33
- Last modified 25.07.2025 15:29:19
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check return result of sb_min_blocksize Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug. Syzkaller forks multiple processes which after mounting the Squashfs filesystem, issues an ioctl("/dev/loop0", LOOP_SET_BLOCK_SIZE, 0x8000). Now if this ioctl occurs at the same time another process is in the process of mounting a Squashfs filesystem on /dev/loop0, the failure occurs. When this happens the following code in squashfs_fill_super() fails. ---- msblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE); msblk->devblksize_log2 = ffz(~msblk->devblksize); ---- sb_min_blocksize() returns 0, which means msblk->devblksize is set to 0. As a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2 is set to 64. This subsequently causes the UBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36 shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long') This commit adds a check for a 0 return by sb_min_blocksize().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
db7096ea160e40d78c67fce52e7cc51bde049497
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
549f9e3d7b60d53808c98b9fde49b4f46d0524a5
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
5c51aa862cbeed2f3887f0382a2708956710bd68
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
6abf6b78c6fb112eee495f5636ffcc350dd2ce25
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
4f99357dadbf9c979ad737156ad4c37fadf7c56b
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
0aff95d9bc7fb5400ca8af507429c4b067bdb425
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
Version <
734aa85390ea693bb7eaf2240623d41b03705c84
Version
0aa666190509ffab81c202c5095a166be23961ac
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.29
Status
affected
Version <
2.6.29
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.295
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|