Описание
In the Linux kernel, the following vulnerability has been resolved:
ublk: santizize the arguments from userspace when adding a device
Sanity check the values for queue depth and number of queues we get from userspace when adding a device.
In the Linux kernel, the following vulnerability has been resolved:
ublk: santizize the arguments from userspace when adding a device
Sanity check the values for queue depth and number of queues we get from userspace when adding a device.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-38182
- https://git.kernel.org/stable/c/0f8df5d6f25ac17c52a8bc6418e60a3e63130550
- https://git.kernel.org/stable/c/3162d8235c8c4d585525cee8a59d1c180940a968
- https://git.kernel.org/stable/c/8c8472855884355caf3d8e0c50adf825f83454b2
- https://git.kernel.org/stable/c/e2b2b7cf6368580114851cb3932f2ad9fbf23386
EPSS
CVE ID
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.
In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.
In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.
In the Linux kernel, the following vulnerability has been resolved: u ...
EPSS