In the Linux kernel, the following vulnerability has been resolved:
9p/net: fix improper handling of bogus negative read/write replies
In p9_client_write() and p9_client_read_once(), if the server
incorrectly replies with success but a negative write/read count then we
would consider written (negative) <= rsize (positive) because both
variables were signed.
Make variables unsigned to avoid this problem.
The reproducer linked below now fails with the following error instead
of a null pointer deref:
9pnet: bogus RWRITE count (4294967295 > 3)
CVSS
No CVSS.
References
Configurations
No configuration.
History
12 May 2025, 17:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 May 2025, 07:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-09 07:16
Updated : 2025-05-12 17:32
NVD link : CVE-2025-37879
Mitre link : CVE-2025-37879
CVE.ORG link : CVE-2025-37879
JSON object : View
Products Affected
No product.
CWE
No CWE.