Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40056

Опубликовано: 28 окт. 2025
Источник: redhat
CVSS3: 4.7

Описание

In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Fix copy_to_iter return value check The return value of copy_to_iter can't be negative, check whether the copied length is equal to the requested length instead of checking for negative values.

A flaw was found in the Linux kernel's vhost/vringh component. This vulnerability arises from an improper check of the copy_to_iter() function's return value, which could lead to the system processing partially copied data. A local attacker with access to the vhost/virtio path (such as root or a user in the kvm/vhost group) could exploit this to cause data corruption or trigger a kernel fault, leading to a denial of service.

Отчет

The fix corrects an improper check of copy_to_iter() in vringh.c. Since copy_to_iter() never returns a negative value, the old code failed to detect short copies. And the new code treats size != translated as an error (-EFAULT). Without the fix, vringh could proceed with partially copied data, risking data corruption and possible kernel faults. Exploitation requires local access to the vhost/virtio path (typically root or membership in kvm/vhost), so the impact is limited to local integrity/availability issues.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelAffected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9kernel-rtAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2406773kernel: Linux kernel: Data corruption and denial of service in vhost/vringh due to improper copy_to_iter return value check

4.7 Medium

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Fix copy_to_iter return value check The return value of copy_to_iter can't be negative, check whether the copied length is equal to the requested length instead of checking for negative values.

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Fix copy_to_iter return value check The return value of copy_to_iter can't be negative, check whether the copied length is equal to the requested length instead of checking for negative values.

CVSS3: 5.5
msrc
5 месяцев назад

vhost: vringh: Fix copy_to_iter return value check

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: v ...

github
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Fix copy_to_iter return value check The return value of copy_to_iter can't be negative, check whether the copied length is equal to the requested length instead of checking for negative values.

4.7 Medium

CVSS3