CVE-2025-38639

In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_nfacct: don't assume acct name is null-terminated BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721 Read of size 1 at addr ffff88801eac95c8 by task syz-executor183/5851 [..] string+0x231/0x2b0 lib/vsprintf.c:721 vsnprintf+0x739/0xf00 lib/vsprintf.c:2874 [..] nfacct_mt_checkentry+0xd2/0xe0 net/netfilter/xt_nfacct.c:41 xt_check_match+0x3d1/0xab0 net/netfilter/x_tables.c:523 nfnl_acct_find_get() handles non-null input, but the error printk relied on its presence.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 16:25

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/58004aa21e79addaf41667bfe65e93ec51653f18 - () https://git.kernel.org/stable/c/58004aa21e79addaf41667bfe65e93ec51653f18 - Patch
References () https://git.kernel.org/stable/c/58007fc7b94fb2702000045ff401eb7f5bde7828 - () https://git.kernel.org/stable/c/58007fc7b94fb2702000045ff401eb7f5bde7828 - Patch
References () https://git.kernel.org/stable/c/66d41268ede1e1b6e71ba28be923397ff0b2b9c3 - () https://git.kernel.org/stable/c/66d41268ede1e1b6e71ba28be923397ff0b2b9c3 - Patch
References () https://git.kernel.org/stable/c/7c1ae471da69c09242834e956218ea6a42dd405a - () https://git.kernel.org/stable/c/7c1ae471da69c09242834e956218ea6a42dd405a - Patch
References () https://git.kernel.org/stable/c/b10cfa2de13d28ddd03210eb234422b7ec92725a - () https://git.kernel.org/stable/c/b10cfa2de13d28ddd03210eb234422b7ec92725a - Patch
References () https://git.kernel.org/stable/c/bf58e667af7d96c8eb9411f926a0a0955f41ce21 - () https://git.kernel.org/stable/c/bf58e667af7d96c8eb9411f926a0a0955f41ce21 - Patch
References () https://git.kernel.org/stable/c/df13c9c6ce1d55c31d1bd49db65a7fbbd86aab13 - () https://git.kernel.org/stable/c/df13c9c6ce1d55c31d1bd49db65a7fbbd86aab13 - Patch
References () https://git.kernel.org/stable/c/e021a1eee196887536a6630c5492c23a4c78d452 - () https://git.kernel.org/stable/c/e021a1eee196887536a6630c5492c23a4c78d452 - Patch
References () https://git.kernel.org/stable/c/e18939176e657a3a20bfbed357b8c55a9f82aba3 - () https://git.kernel.org/stable/c/e18939176e657a3a20bfbed357b8c55a9f82aba3 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/66d41268ede1e1b6e71ba28be923397ff0b2b9c3 -
  • () https://git.kernel.org/stable/c/b10cfa2de13d28ddd03210eb234422b7ec92725a -
  • () https://git.kernel.org/stable/c/e021a1eee196887536a6630c5492c23a4c78d452 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: xt_nfacct: no asuma que el nombre de la cuenta termina en nulo BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721 Read of size 1 at addr ffff88801eac95c8 by task syz-executor183/5851 [..] string+0x231/0x2b0 lib/vsprintf.c:721 vsnprintf+0x739/0xf00 lib/vsprintf.c:2874 [..] nfacct_mt_checkentry+0xd2/0xe0 net/netfilter/xt_nfacct.c:41 xt_check_match+0x3d1/0xab0 net/netfilter/x_tables.c:523 nfnl_acct_find_get() maneja entradas no nulas, pero el error printk dependía de su presencia.

22 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 16:15

Updated : 2026-01-07 16:25


NVD link : CVE-2025-38639

Mitre link : CVE-2025-38639

CVE.ORG link : CVE-2025-38639


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel