๐Ÿ” CVE Alert

CVE-2025-38314

UNKNOWN 0.0

virtio-pci: Fix result size returned for the admin command completion

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: virtio-pci: Fix result size returned for the admin command completion The result size returned by virtio_pci_admin_dev_parts_get() is 8 bytes larger than the actual result data size. This occurs because the result_sg_size field of the command is filled with the result length from virtqueue_get_buf(), which includes both the data size and an additional 8 bytes of status. This oversized result size causes two issues: 1. The state transferred to the destination includes 8 bytes of extra data at the end. 2. The allocated buffer in the kernel may be smaller than the returned size, leading to failures when reading beyond the allocated size. The commit fixes this by subtracting the status size from the result of virtqueue_get_buf(). This fix has been tested through live migrations with virtio-net, virtio-net-transitional, and virtio-blk devices.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
704806ca400e5daa86c110f14bfdda9d28203bb7 < 920b6720bb63893b81516c0c45884a8350f9e4bf 704806ca400e5daa86c110f14bfdda9d28203bb7 < 9ef41ebf787fcbde99ac404ae473f8467641f983
Linux / Linux
6.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/920b6720bb63893b81516c0c45884a8350f9e4bf git.kernel.org: https://git.kernel.org/stable/c/9ef41ebf787fcbde99ac404ae473f8467641f983