CVE-2025-48990

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48990
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48990.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-48990
Aliases
  • GHSA-jvvh-fp57-2p32
Published
2025-06-02T12:15:25Z
Modified
2025-06-03T03:59:40.911163Z
Summary
[none]
Details

NeKernal is a free and open-source operating system stack. Version 0.0.2 has a 1-byte heap overflow in rt_copy_memory, which unconditionally wrote a null terminator at dst[len]. When len equals the size of the destination buffer (256 bytes), that extra '\0' write overruns the buffer by one byte. To avoid breaking existing callers or changing the public API, the patch in commit fb7b7f658327f659c6a6da1af151cb389c2ca4ee takes a minimal approach: it simply removes the overflow-causing line without adding bounds checks or altering the function signature.

References

Affected packages

Git / github.com/nekernel-org/nekernel

Affected ranges

Type
GIT
Repo
https://github.com/nekernel-org/nekernel
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.0.2
0.0.2e1
0.0.2e2-amend
0.0.2e3

1.*

1.0.1