-

CVE-2025-38660

In the Linux kernel, the following vulnerability has been resolved:

[ceph] parse_longname(): strrchr() expects NUL-terminated string

... and parse_longname() is not guaranteed that.  That's the reason
why it uses kmemdup_nul() to build the argument for kstrtou64();
the problem is, kstrtou64() is not the only thing that need it.

Just get a NUL-terminated copy of the entire thing and be done
with that...

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < bb80f7618832d26f7e395f52f82b1dac76223e5f
Version dd66df0053ef84add5e684df517aa9b498342381
Status affected
Version < 3145b2b11492d61c512bbc59660bb823bc757f48
Version dd66df0053ef84add5e684df517aa9b498342381
Status affected
Version < 493479af8af3ab907f49e99323777d498a4fbd2b
Version dd66df0053ef84add5e684df517aa9b498342381
Status affected
Version < 101841c38346f4ca41dc1802c867da990ffb32eb
Version dd66df0053ef84add5e684df517aa9b498342381
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.6
Status affected
Version < 6.6
Version 0
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.054
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string