CVE-2025-38182
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.16 |
| linux | linux_kernel | 6.16 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper sanitization of arguments received from userspace when adding a device via ublk. Specifically, the values for queue depth and number of queues were not properly checked, which could lead to unexpected behavior or security issues. The fix involves adding sanity checks to these values to ensure they are valid.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a malicious userspace process to provide invalid or malicious parameters when adding a device, potentially causing kernel instability, crashes, or other unintended behavior. This could impact system reliability and security.