๐Ÿ” CVE Alert

CVE-2025-38077

UNKNOWN 0.0

platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() If the 'buf' array received from the user contains an empty string, the 'length' variable will be zero. Accessing the 'buf' array element with index 'length - 1' will result in a buffer overflow. Add a check for an empty string. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e8a60aa7404bfef37705da5607c97737073ac38d < fb7cde625872709b8cedad9b241e0ec3d82fa7d3 e8a60aa7404bfef37705da5607c97737073ac38d < 60bd13f8c4b3de2c910ae1cdbef85b9bbc9685f5 e8a60aa7404bfef37705da5607c97737073ac38d < f86465626917df3b8bdd2756ec0cc9d179c5af0f e8a60aa7404bfef37705da5607c97737073ac38d < 8594a123cfa23d708582dc6fb36da34479ef8a5b e8a60aa7404bfef37705da5607c97737073ac38d < 97066373ffd55bd9af0b512ff3dd1f647620a3dc e8a60aa7404bfef37705da5607c97737073ac38d < 4e89a4077490f52cde652d17e32519b666abf3a6
Linux / Linux
5.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fb7cde625872709b8cedad9b241e0ec3d82fa7d3 git.kernel.org: https://git.kernel.org/stable/c/60bd13f8c4b3de2c910ae1cdbef85b9bbc9685f5 git.kernel.org: https://git.kernel.org/stable/c/f86465626917df3b8bdd2756ec0cc9d179c5af0f git.kernel.org: https://git.kernel.org/stable/c/8594a123cfa23d708582dc6fb36da34479ef8a5b git.kernel.org: https://git.kernel.org/stable/c/97066373ffd55bd9af0b512ff3dd1f647620a3dc git.kernel.org: https://git.kernel.org/stable/c/4e89a4077490f52cde652d17e32519b666abf3a6 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html