๐Ÿ” CVE Alert

CVE-2025-38660

UNKNOWN 0.0

[ceph] parse_longname(): strrchr() expects NUL-terminated string

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: [ceph] parse_longname(): strrchr() expects NUL-terminated string ... and parse_longname() is not guaranteed that. That's the reason why it uses kmemdup_nul() to build the argument for kstrtou64(); the problem is, kstrtou64() is not the only thing that need it. Just get a NUL-terminated copy of the entire thing and be done with that...

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 22, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dd66df0053ef84add5e684df517aa9b498342381 < bb80f7618832d26f7e395f52f82b1dac76223e5f dd66df0053ef84add5e684df517aa9b498342381 < 3145b2b11492d61c512bbc59660bb823bc757f48 dd66df0053ef84add5e684df517aa9b498342381 < 493479af8af3ab907f49e99323777d498a4fbd2b dd66df0053ef84add5e684df517aa9b498342381 < 101841c38346f4ca41dc1802c867da990ffb32eb
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/bb80f7618832d26f7e395f52f82b1dac76223e5f git.kernel.org: https://git.kernel.org/stable/c/3145b2b11492d61c512bbc59660bb823bc757f48 git.kernel.org: https://git.kernel.org/stable/c/493479af8af3ab907f49e99323777d498a4fbd2b git.kernel.org: https://git.kernel.org/stable/c/101841c38346f4ca41dc1802c867da990ffb32eb