-
CVE-2025-38660
- EPSS 0.03%
- Published 22.08.2025 16:01:03
- Last modified 22.08.2025 18:08:51
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: [ceph] parse_longname(): strrchr() expects NUL-terminated string ... and parse_longname() is not guaranteed that. That's the reason why it uses kmemdup_nul() to build the argument for kstrtou64(); the problem is, kstrtou64() is not the only thing that need it. Just get a NUL-terminated copy of the entire thing and be done with that...
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
bb80f7618832d26f7e395f52f82b1dac76223e5f
Version
dd66df0053ef84add5e684df517aa9b498342381
Status
affected
Version <
3145b2b11492d61c512bbc59660bb823bc757f48
Version
dd66df0053ef84add5e684df517aa9b498342381
Status
affected
Version <
493479af8af3ab907f49e99323777d498a4fbd2b
Version
dd66df0053ef84add5e684df517aa9b498342381
Status
affected
Version <
101841c38346f4ca41dc1802c867da990ffb32eb
Version
dd66df0053ef84add5e684df517aa9b498342381
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.6
Status
affected
Version <
6.6
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.054 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|