CVE-2025-37803
Published: May 9, 2025Last modified: May 9, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.8 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.140-r0) |
| 25 LTS | linux-lts | Fixed (6.12.57-r0) | |
| Stream | linux-lts | Fixed (6.12.57-r0) |
References
- https://git.kernel.org/stable/c/021ba7f1babd029e714d13a6bf2571b08af96d0f
- https://git.kernel.org/stable/c/13fe12c037b470321436deec393030c6153cfeb9
- https://git.kernel.org/stable/c/29b65a3171a49c9b69f31035146be966cec40b7a
- https://git.kernel.org/stable/c/2b8419c6ecf69007dcff54ea0b9f0b215282c55a
- https://git.kernel.org/stable/c/373512760e13fdaa726faa9502d0f5be2abb3d33
- https://git.kernel.org/stable/c/3f6c9d66e0f8eb9679b57913aa64b4d2266f6fbe
- https://git.kernel.org/stable/c/b2ff4e9c599b000833d16a917f519aa2e4a75de2
- https://git.kernel.org/stable/c/e84a08fc7e25cdad5d9a3def42cc770ff711193f
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html