CVE-2025-38314
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's virtio-pci driver causes the result size returned by the function virtio_pci_admin_dev_parts_get() to be 8 bytes larger than the actual data size. This happens because the result size includes an extra 8 bytes of status data, leading to two problems: extra data being transferred unnecessarily, and potential failures when reading beyond the allocated buffer size in the kernel. The issue is fixed by subtracting the status size from the returned result size.
How can this vulnerability impact me? :
The vulnerability can cause kernel buffer over-reads or data corruption due to reading beyond the allocated buffer size. This may lead to system instability or failures during operations involving virtio devices, such as live migrations with virtio-net or virtio-blk devices.