In the Linux kernel, the following vulnerability has been resolved:
Input: ims-pcu - check record size in ims_pcu_flash_firmware()
The "len" variable comes from the firmware and we generally do
trust firmware, but it's always better to double check. If the "len"
is too large it could result in memory corruption when we do
"memcpy(fragment->data, rec->data, len);"
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 18:28
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-787 | |
| References | () https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6 - Patch | |
| References | () https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87 - Patch | |
| References | () https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec - Patch | |
| References | () https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f - Patch | |
| References | () https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102 - Patch | |
| References | () https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204 - Patch | |
| References | () https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1 - Patch | |
| References | () https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
25 Jul 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 15:15
Updated : 2025-12-23 18:28
NVD link : CVE-2025-38428
Mitre link : CVE-2025-38428
CVE.ORG link : CVE-2025-38428
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
