In the Linux kernel, the following vulnerability has been resolved:
crypto: lzo - Fix compression buffer overrun
Unlike the decompression code, the compression code in LZO never
checked for output overruns. It instead assumes that the caller
always provides enough buffer space, disregarding the buffer length
provided by the caller.
Add a safe compression interface that checks for the end of buffer
before each write. Use the safe interface in crypto/lzo.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-787 | |
| References | () https://git.kernel.org/stable/c/0acdc4d6e679ba31d01e3e7e2e4124b76d6d8e2a - Patch | |
| References | () https://git.kernel.org/stable/c/167373d77c70c2b558aae3e327b115249bb2652c - Patch | |
| References | () https://git.kernel.org/stable/c/4b173bb2c4665c23f8fcf5241c7b06dfa6b5b111 - Patch | |
| References | () https://git.kernel.org/stable/c/7caad075acb634a74911830d6386c50ea12566cd - Patch | |
| References | () https://git.kernel.org/stable/c/a98bd864e16f91c70b2469adf013d713d04d1d13 - Patch | |
| References | () https://git.kernel.org/stable/c/cc47f07234f72cbd8e2c973cdbf2a6730660a463 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
18 Jun 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-18 10:15
Updated : 2025-12-17 18:53
NVD link : CVE-2025-38068
Mitre link : CVE-2025-38068
CVE.ORG link : CVE-2025-38068
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
