In the Linux kernel, the following vulnerability has been resolved:
LoongArch: KVM: Avoid overflow with array index
The variable index is modified and reused as array index when modify
register EIOINTC_ENABLE. There will be array index overflow problem.
References
Configurations
Configuration 1 (hide)
|
History
19 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/080e8d2ecdfde588897aa8a87a8884061f4dbbbb - Patch | |
| References | () https://git.kernel.org/stable/c/2cc84c4b0d70d42e291862ecc848890d18e1004a - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-129 |
Information
Published : 2025-07-25 13:15
Updated : 2025-11-19 20:17
NVD link : CVE-2025-38367
Mitre link : CVE-2025-38367
CVE.ORG link : CVE-2025-38367
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index
