Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-39795

Опубликовано: 12 сент. 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: block: avoid possible overflow for chunk_sectors check in blk_stack_limits() In blk_stack_limits(), we check that the t->chunk_sectors value is a multiple of the t->physical_block_size value. However, by finding the chunk_sectors value in bytes, we may overflow the unsigned int which holds chunk_sectors, so change the check to be based on sectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.16.3-1package
linuxfixed6.12.43-1trixiepackage

Примечания

  • https://git.kernel.org/linus/448dfecc7ff807822ecd47a5c052acedca7d09e8 (6.17-rc1)

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

ubuntu
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: block: avoid possible overflow for chunk_sectors check in blk_stack_limits() In blk_stack_limits(), we check that the t->chunk_sectors value is a multiple of the t->physical_block_size value. However, by finding the chunk_sectors value in bytes, we may overflow the unsigned int which holds chunk_sectors, so change the check to be based on sectors.

nvd
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: block: avoid possible overflow for chunk_sectors check in blk_stack_limits() In blk_stack_limits(), we check that the t->chunk_sectors value is a multiple of the t->physical_block_size value. However, by finding the chunk_sectors value in bytes, we may overflow the unsigned int which holds chunk_sectors, so change the check to be based on sectors.

CVSS3: 4
msrc
около 2 месяцев назад

block: avoid possible overflow for chunk_sectors check in blk_stack_limits()

github
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: block: avoid possible overflow for chunk_sectors check in blk_stack_limits() In blk_stack_limits(), we check that the t->chunk_sectors value is a multiple of the t->physical_block_size value. However, by finding the chunk_sectors value in bytes, we may overflow the unsigned int which holds chunk_sectors, so change the check to be based on sectors.

oracle-oval
22 дня назад

ELSA-2025-20662: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 14%
0.00047
Низкий