CVE-2025-38077

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow. Add a check for an empty string. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

17 Dec 2025, 17:58

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4e89a4077490f52cde652d17e32519b666abf3a6 - () https://git.kernel.org/stable/c/4e89a4077490f52cde652d17e32519b666abf3a6 - Patch
References () https://git.kernel.org/stable/c/60bd13f8c4b3de2c910ae1cdbef85b9bbc9685f5 - () https://git.kernel.org/stable/c/60bd13f8c4b3de2c910ae1cdbef85b9bbc9685f5 - Patch
References () https://git.kernel.org/stable/c/8594a123cfa23d708582dc6fb36da34479ef8a5b - () https://git.kernel.org/stable/c/8594a123cfa23d708582dc6fb36da34479ef8a5b - Patch
References () https://git.kernel.org/stable/c/97066373ffd55bd9af0b512ff3dd1f647620a3dc - () https://git.kernel.org/stable/c/97066373ffd55bd9af0b512ff3dd1f647620a3dc - Patch
References () https://git.kernel.org/stable/c/f86465626917df3b8bdd2756ec0cc9d179c5af0f - () https://git.kernel.org/stable/c/f86465626917df3b8bdd2756ec0cc9d179c5af0f - Patch
References () https://git.kernel.org/stable/c/fb7cde625872709b8cedad9b241e0ec3d82fa7d3 - () https://git.kernel.org/stable/c/fb7cde625872709b8cedad9b241e0ec3d82fa7d3 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-787

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: platform/x86: dell-wmi-sysman: Evitar el desbordamiento de búfer en current_password_store(). Si la matriz 'buf' recibida del usuario contiene una cadena vacía, la variable 'length' será cero. Acceder al elemento de la matriz 'buf' con el índice 'length - 1' provocará un desbordamiento de búfer. Se ha añadido una comprobación para cadenas vacías. Encontrado por el Centro de Verificación de Linux (linuxtesting.org) con SVACE.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

18 Jun 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 10:15

Updated : 2025-12-17 17:58


NVD link : CVE-2025-38077

Mitre link : CVE-2025-38077

CVE.ORG link : CVE-2025-38077


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write