In the Linux kernel, the following vulnerability has been resolved:
netfilter: xt_nfacct: don't assume acct name is null-terminated
BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721 Read of size 1 at addr ffff88801eac95c8 by task syz-executor183/5851 [..] string+0x231/0x2b0 lib/vsprintf.c:721 vsnprintf+0x739/0xf00 lib/vsprintf.c:2874 [..] nfacctmtcheckentry+0xd2/0xe0 net/netfilter/xtnfacct.c:41 xtcheckmatch+0x3d1/0xab0 net/netfilter/xtables.c:523
nfnlacctfind_get() handles non-null input, but the error printk relied on its presence.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/9c3874e559580d6c6ec8d449812ac11277724770/cves/2025/38xxx/CVE-2025-38639.json",
"cna_assigner": "Linux"
}