CVE-2025-37879

In the Linux kernel, the following vulnerability has been resolved: 9p/net: fix improper handling of bogus negative read/write replies In p9_client_write() and p9_client_read_once(), if the server incorrectly replies with success but a negative write/read count then we would consider written (negative) <= rsize (positive) because both variables were signed. Make variables unsigned to avoid this problem. The reproducer linked below now fails with the following error instead of a null pointer deref: 9pnet: bogus RWRITE count (4294967295 > 3)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 19:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/374e4cd75617c8c2552f562f39dd989583f5c330 - () https://git.kernel.org/stable/c/374e4cd75617c8c2552f562f39dd989583f5c330 - Patch
References () https://git.kernel.org/stable/c/468ff4a7c61fb811c596a7c44b6a5455e40fd12b - () https://git.kernel.org/stable/c/468ff4a7c61fb811c596a7c44b6a5455e40fd12b - Patch
References () https://git.kernel.org/stable/c/a68768e280b7d0c967ea509e791bb9b90adc94a5 - () https://git.kernel.org/stable/c/a68768e280b7d0c967ea509e791bb9b90adc94a5 - Patch
References () https://git.kernel.org/stable/c/c548f95688e2b5ae0e2ae43d53cf717156c7d034 - () https://git.kernel.org/stable/c/c548f95688e2b5ae0e2ae43d53cf717156c7d034 - Patch
References () https://git.kernel.org/stable/c/d0259a856afca31d699b706ed5e2adf11086c73b - () https://git.kernel.org/stable/c/d0259a856afca31d699b706ed5e2adf11086c73b - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: 9p/net: se corrige el manejo incorrecto de respuestas de lectura/escritura negativas falsas. En p9_client_write() y p9_client_read_once(), si el servidor responde incorrectamente con éxito, pero con un recuento de escrituras/lecturas negativo, se consideraría que "escrito" (negativo) &lt;= "rsize" (positivo) porque ambas variables estaban firmadas. Para evitar este problema, desactive el signo de las variables. El reproductor enlazado a continuación ahora falla con el siguiente error en lugar de una referencia de puntero nulo: 9pnet: recuento de RWRITE falso (4294967295 &gt; 3)

09 May 2025, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 07:16

Updated : 2025-11-12 19:53


NVD link : CVE-2025-37879

Mitre link : CVE-2025-37879

CVE.ORG link : CVE-2025-37879


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read