In the Linux kernel, the following vulnerability has been resolved:
udmabuf: fix a buf size overflow issue during udmabuf creation
by casting size_limit_mb to u64 when calculate pglimit.
References
Configurations
Configuration 1 (hide)
|
History
05 Jun 2025, 14:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/021ba7f1babd029e714d13a6bf2571b08af96d0f - Patch | |
References | () https://git.kernel.org/stable/c/13fe12c037b470321436deec393030c6153cfeb9 - Patch | |
References | () https://git.kernel.org/stable/c/2b8419c6ecf69007dcff54ea0b9f0b215282c55a - Patch | |
References | () https://git.kernel.org/stable/c/373512760e13fdaa726faa9502d0f5be2abb3d33 - Patch | |
References | () https://git.kernel.org/stable/c/3f6c9d66e0f8eb9679b57913aa64b4d2266f6fbe - Patch | |
References | () https://git.kernel.org/stable/c/b2ff4e9c599b000833d16a917f519aa2e4a75de2 - Patch | |
References | () https://git.kernel.org/stable/c/e84a08fc7e25cdad5d9a3def42cc770ff711193f - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 May 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 07:15
Updated : 2025-06-05 14:32
NVD link : CVE-2025-37803
Mitre link : CVE-2025-37803
CVE.ORG link : CVE-2025-37803
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')