CVE-2025-38061

In the Linux kernel, the following vulnerability has been resolved: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() Honour the user given buffer size for the strn_len() calls (otherwise strn_len() will access memory outside of the user given buffer).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

18 Dec 2025, 21:31

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df - () https://git.kernel.org/stable/c/128cdb617a87767c29be43e4431129942fce41df - Patch
References () https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77 - () https://git.kernel.org/stable/c/425e64440ad0a2f03bdaf04be0ae53dededbaa77 - Patch
References () https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6 - () https://git.kernel.org/stable/c/5bfa81539e22af4c40ae5d43d7212253462383a6 - Patch
References () https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4 - () https://git.kernel.org/stable/c/6b1d3e9db82d01a88de1795b879df67c2116b4f4 - Patch
References () https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102 - () https://git.kernel.org/stable/c/8fef258b555c75a467a6b4b7e3a3cbc46d5f4102 - Patch
References () https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900 - () https://git.kernel.org/stable/c/a3d89f1cfe1e6d4bb164db2595511fd33db21900 - Patch
References () https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6 - () https://git.kernel.org/stable/c/c81c2ee1c3b050ed5c4e92876590cc7a259183f6 - Patch
References () https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5 - () https://git.kernel.org/stable/c/ef1158a6a650ecee72ab40851b1d52e04d3f9cb5 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: pktgen: corrige el acceso fuera del búfer dado por el usuario en pktgen_thread_write() Respeta el tamaño del búfer dado por el usuario para las llamadas strn_len() (de lo contrario, strn_len() accederá a la memoria fuera del búfer dado por el usuario).
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

18 Jun 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 10:15

Updated : 2025-12-18 21:31


NVD link : CVE-2025-38061

Mitre link : CVE-2025-38061

CVE.ORG link : CVE-2025-38061


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel