First published: Fri May 09 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: 9p/net: fix improper handling of bogus negative read/write replies In p9_client_write() and p9_client_read_once(), if the server incorrectly replies with success but a negative write/read count then we would consider written (negative) <= rsize (positive) because both variables were signed. Make variables unsigned to avoid this problem. The reproducer linked below now fails with the following error instead of a null pointer deref: 9pnet: bogus RWRITE count (4294967295 > 3)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37879 has been categorized with a low severity level as it involves improper handling of negative read/write replies in the Linux kernel.
To remediate CVE-2025-37879, update the Linux kernel to the latest version where this vulnerability has been resolved.
CVE-2025-37879 affects various versions of the Linux kernel that implement the 9p network protocol.
The potential impacts of CVE-2025-37879 include improper handling of data during read/write operations, which could lead to data corruption.
Yes, an update addressing CVE-2025-37879 has been released and users are encouraged to apply the latest patches.