CVE-2025-38264

In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: sanitize request list handling Validate the request in nvme_tcp_handle_r2t() to ensure it's not part of any list, otherwise a malicious R2T PDU might inject a loop in request list processing.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Nov 2025, 18:22

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0bf04c874fcb1ae46a863034296e4b33d8fbd66c - () https://git.kernel.org/stable/c/0bf04c874fcb1ae46a863034296e4b33d8fbd66c - Patch
References () https://git.kernel.org/stable/c/78a4adcd3fedb0728436e8094848ebf4c6bae006 - () https://git.kernel.org/stable/c/78a4adcd3fedb0728436e8094848ebf4c6bae006 - Patch
References () https://git.kernel.org/stable/c/f054ea62598197714a6ca7b3b387a027308f8b13 - () https://git.kernel.org/stable/c/f054ea62598197714a6ca7b3b387a027308f8b13 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-tcp: desinfectar el manejo de la lista de solicitudes Valide la solicitud en nvme_tcp_handle_r2t() para asegurarse de que no sea parte de ninguna lista; de lo contrario, una PDU R2T maliciosa podría inyectar un bucle en el procesamiento de la lista de solicitudes.

09 Jul 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 11:15

Updated : 2025-11-18 18:22


NVD link : CVE-2025-38264

Mitre link : CVE-2025-38264

CVE.ORG link : CVE-2025-38264


JSON object : View

Products Affected

linux

  • linux_kernel