Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.0, < 6.6.95 |
References
- https://git.kernel.org/stable/c/0f8df5d6f25ac17c52a8bc6418e60a3e63130550Patch
- https://git.kernel.org/stable/c/3162d8235c8c4d585525cee8a59d1c180940a968Patch
- https://git.kernel.org/stable/c/8c8472855884355caf3d8e0c50adf825f83454b2Patch
- https://git.kernel.org/stable/c/e2b2b7cf6368580114851cb3932f2ad9fbf23386Patch
FAQ
What is CVE-2025-38182?
CVE-2025-38182 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we ...
How severe is CVE-2025-38182?
CVE-2025-38182 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38182?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.