CVE-2025-38375

In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_linearize_page, when reading the following buffers from the ring, we forget to check the received length with the true allocate size. This can lead to an out-of-bound read. This commit adds that missing check.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 17:03

Type Values Removed Values Added
CWE CWE-125
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8 - () https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8 - Patch
References () https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73 - () https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73 - Patch
References () https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58 - () https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58 - Patch
References () https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c - () https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c - Patch
References () https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b - () https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b - Patch
References () https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651 - () https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651 - Patch
References () https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef - () https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef - Patch
References () https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1 - () https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio-net: garantizar que la longitud recibida no supere el tamaño asignado. En xdp_linearize_page, al leer los siguientes búferes del anillo, se olvida verificar la longitud recibida con el tamaño asignado real. Esto puede provocar una lectura fuera de los límites. Este commit añade esta verificación faltante.
References
  • () https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c -
  • () https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1 -

25 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 13:15

Updated : 2025-12-16 17:03


NVD link : CVE-2025-38375

Mitre link : CVE-2025-38375

CVE.ORG link : CVE-2025-38375


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read