[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025071015-CVE-2025-38314-5977@gregkh>
Date: Thu, 10 Jul 2025 09:42:55 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38314: virtio-pci: Fix result size returned for the admin command completion
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
virtio-pci: Fix result size returned for the admin command completion
The result size returned by virtio_pci_admin_dev_parts_get() is 8 bytes
larger than the actual result data size. This occurs because the
result_sg_size field of the command is filled with the result length
from virtqueue_get_buf(), which includes both the data size and an
additional 8 bytes of status.
This oversized result size causes two issues:
1. The state transferred to the destination includes 8 bytes of extra
data at the end.
2. The allocated buffer in the kernel may be smaller than the returned
size, leading to failures when reading beyond the allocated size.
The commit fixes this by subtracting the status size from the result of
virtqueue_get_buf().
This fix has been tested through live migrations with virtio-net,
virtio-net-transitional, and virtio-blk devices.
The Linux kernel CVE team has assigned CVE-2025-38314 to this issue.
Affected and fixed versions
===========================
Issue introduced in 6.13 with commit 704806ca400e5daa86c110f14bfdda9d28203bb7 and fixed in 6.15.3 with commit 920b6720bb63893b81516c0c45884a8350f9e4bf
Issue introduced in 6.13 with commit 704806ca400e5daa86c110f14bfdda9d28203bb7 and fixed in 6.16-rc1 with commit 9ef41ebf787fcbde99ac404ae473f8467641f983
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38314
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/virtio/virtio_pci_modern.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/920b6720bb63893b81516c0c45884a8350f9e4bf
https://git.kernel.org/stable/c/9ef41ebf787fcbde99ac404ae473f8467641f983
Powered by blists - more mailing lists