CVE-2025-22104

In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Use kernel helpers for hex dumps Previously, when the driver was printing hex dumps, the buffer was cast to an 8 byte long and printed using string formatters. If the buffer size was not a multiple of 8 then a read buffer overflow was possible. Therefore, create a new ibmvnic function that loops over a buffer and calls hex_dump_to_buffer instead. This patch address KASAN reports like the one below: ibmvnic 30000003 env3: Login Buffer: ibmvnic 30000003 env3: 01000000af000000 <...> ibmvnic 30000003 env3: 2e6d62692e736261 ibmvnic 30000003 env3: 65050003006d6f63 ================================================================== BUG: KASAN: slab-out-of-bounds in ibmvnic_login+0xacc/0xffc [ibmvnic] Read of size 8 at addr c0000001331a9aa8 by task ip/17681 <...> Allocated by task 17681: <...> ibmvnic_login+0x2f0/0xffc [ibmvnic] ibmvnic_open+0x148/0x308 [ibmvnic] __dev_open+0x1ac/0x304 <...> The buggy address is located 168 bytes inside of allocated 175-byte region [c0000001331a9a00, c0000001331a9aaf) <...> ================================================================= ibmvnic 30000003 env3: 000000000033766e
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Nov 2025, 18:44

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ibmvnic: Uso de ayudantes del kernel para volcados hexadecimales. Anteriormente, cuando el controlador imprimía volcados hexadecimales, el búfer se convertía a una longitud de 8 bytes y se imprimía mediante formateadores de cadenas. Si el tamaño del búfer no era múltiplo de 8, era posible un desbordamiento del búfer de lectura. Por lo tanto, cree una nueva función ibmvnic que recorra un búfer y llame a hex_dump_to_buffer en su lugar. Este parche soluciona informes de KASAN como el siguiente: ibmvnic 30000003 env3: Login Buffer: ibmvnic 30000003 env3: 01000000af000000 &lt;...&gt; ibmvnic 30000003 env3: 2e6d62692e736261 ibmvnic 30000003 env3: 65050003006d6f63 ====================================================================== ERROR: KASAN: slab-out-of-bounds en ibmvnic_login+0xacc/0xffc [ibmvnic] Lectura de tamaño 8 en la dirección c0000001331a9aa8 por la tarea ip/17681 &lt;...&gt; Asignado por la tarea 17681: &lt;...&gt; ibmvnic_login+0x2f0/0xffc [ibmvnic] ibmvnic_open+0x148/0x308 [ibmvnic] __dev_open+0x1ac/0x304 &lt;...&gt; La dirección con errores se encuentra 168 bytes dentro de la región asignada de 175 bytes [c0000001331a9a00, c0000001331a9aaf) &lt;...&gt; ===================================================================== ibmvnic 30000003 env3: 00000000033766e
References () https://git.kernel.org/stable/c/ae6b1d6c1acee3a2000394d83ec9f1028321e207 - () https://git.kernel.org/stable/c/ae6b1d6c1acee3a2000394d83ec9f1028321e207 - Patch
References () https://git.kernel.org/stable/c/d93a6caab5d7d9b5ce034d75b1e1e993338e3852 - () https://git.kernel.org/stable/c/d93a6caab5d7d9b5ce034d75b1e1e993338e3852 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125

16 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:16

Updated : 2025-11-03 18:44


NVD link : CVE-2025-22104

Mitre link : CVE-2025-22104

CVE.ORG link : CVE-2025-22104


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read