Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_linearize_page, when reading the following buffers from the ring, we forget to check the received length with the true allocate size. This can lead to an out-of-bound read. This commit adds that missing check.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.14, < 5.4.297 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8Patch
- https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73Patch
- https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58Patch
- https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660cPatch
- https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649bPatch
- https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651Patch
- https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81efPatch
- https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1Patch
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlThird Party Advisory
FAQ
What is CVE-2025-38375?
CVE-2025-38375 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_linearize_page, when reading the following buffers fr...
How severe is CVE-2025-38375?
CVE-2025-38375 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38375?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.