Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-38182

Опубликовано: 04 июл. 2025
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.

Отчет

A missing input validation in ublk_ctrl_add_dev() in the ublk driver allows an unprivileged userspace application (if UBLK_F_UNPRIVILEGED_DEV is enabled) or a privileged user (CAP_SYS_ADMIN) to supply invalid queue_depth or nr_hw_queues values. If unchecked, these values could exceed internal limits, possibly leading to a kernel crash. Triggering this vulnerability requires either root privileges or elevated capabilities (CAP_SYS_ADMIN) unless the system is explicitly configured to allow unprivileged ublk devices, which is rare.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2376390kernel: ublk: santizize the arguments from userspace when adding a device

EPSS

Процентиль: 4%
0.00023
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

ubuntu
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.

nvd
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.

msrc
13 дней назад

Описание отсутствует

debian
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: u ...

github
около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.

EPSS

Процентиль: 4%
0.00023
Низкий

6.6 Medium

CVSS3