Acknowledged
Created: Jul 9, 2025
Updated: Jul 10, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]s390/pkey: Prevent overflow in size calculation for memdup_user()[EOL][EOL]Number of apqn target list entries contained in 'nr_apqns' variable is[EOL]determined by userspace via an ioctl call so the result of the product in[EOL]calculation of size passed to memdup_user() may overflow.[EOL][EOL]In this case the actual size of the allocated area and the value[EOL]describing it won't be in sync leading to various types of unpredictable[EOL]behaviour later.[EOL][EOL]Use a proper memdup_array_user() helper which returns an error if an[EOL]overflow is detected. Note that it is different from when nr_apqns is[EOL]initially zero - that case is considered valid and should be handled in[EOL]subsequent pkey_handler implementations.[EOL][EOL]Found by Linux Verification Center (linuxtesting.org).
CREATE(Triage):(User=admin) [CVE-2025-38257 (https://nvd.nist.gov/vuln/detail/CVE-2025-38257)