CVE-2025-38375
EUVD-2025-2262825.07.2025, 13:15
In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_linearize_page, when reading the following buffers from the ring, we forget to check the received length with the true allocate size. This can lead to an out-of-bound read. This commit adds that missing check.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.14 ≤ 𝑥 < 5.4.297 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.241 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.189 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.144 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.97 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.37 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.15.6 |
| linux | linux_kernel | 6.16:rc1 |
| linux | linux_kernel | 6.16:rc2 |
| linux | linux_kernel | 6.16:rc3 |
| linux | linux_kernel | 6.16:rc4 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References