-
CVE-2025-71197
- EPSS -
- Veröffentlicht 04.02.2026 16:07:32
- Zuletzt bearbeitet 04.02.2026 17:16:11
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: w1: therm: Fix off-by-one buffer overflow in alarms_store The sysfs buffer passed to alarms_store() is allocated with 'size + 1' bytes and a NUL terminator is appended. However, the 'size' argument does not account for this extra byte. The original code then allocated 'size' bytes and used strcpy() to copy 'buf', which always writes one byte past the allocated buffer since strcpy() copies until the NUL terminator at index 'size'. Fix this by parsing the 'buf' parameter directly using simple_strtoll() without allocating any intermediate memory or string copying. This removes the overflow while simplifying the code.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
6a5820ecfa5a76c3d3e154802c8c15f391ef442e
Version
e2c94d6f572079511945e64537eb1218643f2e68
Status
affected
Version <
6fd6d2a8e41b7f544a4d26cbd60bedf9c67893a0
Version
e2c94d6f572079511945e64537eb1218643f2e68
Status
affected
Version <
e6b2609af21b5cccc9559339591b8a2cbf884169
Version
e2c94d6f572079511945e64537eb1218643f2e68
Status
affected
Version <
761fcf46a1bd797bd32d23f3ea0141ffd437668a
Version
e2c94d6f572079511945e64537eb1218643f2e68
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.8
Status
affected
Version <
5.8
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.122
Status
unaffected
Version <=
6.12.*
Version
6.12.68
Status
unaffected
Version <=
6.18.*
Version
6.18.8
Status
unaffected
Version <=
*
Version
6.19-rc7
Status
unaffected