CVE-2025-38660

Source
https://cve.org/CVERecord?id=CVE-2025-38660
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38660.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38660
Downstream
Related
Published
2025-08-22T16:01:03.686Z
Modified
2026-03-12T02:15:18.270959Z
Summary
[ceph] parse_longname(): strrchr() expects NUL-terminated string
Details

In the Linux kernel, the following vulnerability has been resolved:

[ceph] parse_longname(): strrchr() expects NUL-terminated string

... and parselongname() is not guaranteed that. That's the reason why it uses kmemdupnul() to build the argument for kstrtou64(); the problem is, kstrtou64() is not the only thing that need it.

Just get a NUL-terminated copy of the entire thing and be done with that...

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38660.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dd66df0053ef84add5e684df517aa9b498342381
Fixed
bb80f7618832d26f7e395f52f82b1dac76223e5f
Fixed
3145b2b11492d61c512bbc59660bb823bc757f48
Fixed
493479af8af3ab907f49e99323777d498a4fbd2b
Fixed
101841c38346f4ca41dc1802c867da990ffb32eb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38660.json"