๐Ÿ” CVE Alert

CVE-2025-38257

UNKNOWN 0.0

s390/pkey: Prevent overflow in size calculation for memdup_user()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apqn target list entries contained in 'nr_apqns' variable is determined by userspace via an ioctl call so the result of the product in calculation of size passed to memdup_user() may overflow. In this case the actual size of the allocated area and the value describing it won't be in sync leading to various types of unpredictable behaviour later. Use a proper memdup_array_user() helper which returns an error if an overflow is detected. Note that it is different from when nr_apqns is initially zero - that case is considered valid and should be handled in subsequent pkey_handler implementations. Found by Linux Verification Center (linuxtesting.org).

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d < ad1bdd24a02d5a8d119af8e4cd50933780a6d29f f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d < faa1ab4a23c42e34dc000ef4977b751d94d5148c f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d < 88f3869649edbc4a13f6c2877091f81cd5a50f05 f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d < f855b119e62b004a5044ed565f2a2b368c4d3f16 f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d < 73483ca7e07a5e39bdf612eec9d3d293e8bef649 f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d < 7360ee47599af91a1d5f4e74d635d9408a54e489
Linux / Linux
5.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ad1bdd24a02d5a8d119af8e4cd50933780a6d29f git.kernel.org: https://git.kernel.org/stable/c/faa1ab4a23c42e34dc000ef4977b751d94d5148c git.kernel.org: https://git.kernel.org/stable/c/88f3869649edbc4a13f6c2877091f81cd5a50f05 git.kernel.org: https://git.kernel.org/stable/c/f855b119e62b004a5044ed565f2a2b368c4d3f16 git.kernel.org: https://git.kernel.org/stable/c/73483ca7e07a5e39bdf612eec9d3d293e8bef649 git.kernel.org: https://git.kernel.org/stable/c/7360ee47599af91a1d5f4e74d635d9408a54e489 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html