We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38314

virtio-pci: Fix result size returned for the admin command completion



Description

In the Linux kernel, the following vulnerability has been resolved: virtio-pci: Fix result size returned for the admin command completion The result size returned by virtio_pci_admin_dev_parts_get() is 8 bytes larger than the actual result data size. This occurs because the result_sg_size field of the command is filled with the result length from virtqueue_get_buf(), which includes both the data size and an additional 8 bytes of status. This oversized result size causes two issues: 1. The state transferred to the destination includes 8 bytes of extra data at the end. 2. The allocated buffer in the kernel may be smaller than the returned size, leading to failures when reading beyond the allocated size. The commit fixes this by subtracting the status size from the result of virtqueue_get_buf(). This fix has been tested through live migrations with virtio-net, virtio-net-transitional, and virtio-blk devices.

Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linux

Product status

Default status
unaffected

704806ca400e5daa86c110f14bfdda9d28203bb7 before 920b6720bb63893b81516c0c45884a8350f9e4bf
affected

704806ca400e5daa86c110f14bfdda9d28203bb7 before 9ef41ebf787fcbde99ac404ae473f8467641f983
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.15.3
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/920b6720bb63893b81516c0c45884a8350f9e4bf

git.kernel.org/...c/9ef41ebf787fcbde99ac404ae473f8467641f983

cve.org (CVE-2025-38314)

nvd.nist.gov (CVE-2025-38314)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38314

Support options

Helpdesk Chat, Email, Knowledgebase