Bug 2365241 (CVE-2025-37879) - CVE-2025-37879 kernel: 9p/net: fix improper handling of bogus negative read/write replies
Summary: CVE-2025-37879 kernel: 9p/net: fix improper handling of bogus negative read/w...
Keywords:
Status: NEW
Alias: CVE-2025-37879
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-09 07:01 UTC by OSIDB Bzimport
Modified: 2025-05-09 09:34 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-09 07:01:18 UTC
In the Linux kernel, the following vulnerability has been resolved:

9p/net: fix improper handling of bogus negative read/write replies

In p9_client_write() and p9_client_read_once(), if the server
incorrectly replies with success but a negative write/read count then we
would consider written (negative) <= rsize (positive) because both
variables were signed.

Make variables unsigned to avoid this problem.

The reproducer linked below now fails with the following error instead
of a null pointer deref:
9pnet: bogus RWRITE count (4294967295 > 3)


Note You need to log in before you can comment on or make changes to this bug.