{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38660","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.031Z","datePublished":"2025-08-22T16:01:03.686Z","dateUpdated":"2026-05-11T21:32:30.839Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:32:30.839Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\n[ceph] parse_longname(): strrchr() expects NUL-terminated string\n\n... and parse_longname() is not guaranteed that.  That's the reason\nwhy it uses kmemdup_nul() to build the argument for kstrtou64();\nthe problem is, kstrtou64() is not the only thing that need it.\n\nJust get a NUL-terminated copy of the entire thing and be done\nwith that..."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ceph/crypto.c"],"versions":[{"version":"dd66df0053ef84add5e684df517aa9b498342381","lessThan":"bb80f7618832d26f7e395f52f82b1dac76223e5f","status":"affected","versionType":"git"},{"version":"dd66df0053ef84add5e684df517aa9b498342381","lessThan":"3145b2b11492d61c512bbc59660bb823bc757f48","status":"affected","versionType":"git"},{"version":"dd66df0053ef84add5e684df517aa9b498342381","lessThan":"493479af8af3ab907f49e99323777d498a4fbd2b","status":"affected","versionType":"git"},{"version":"dd66df0053ef84add5e684df517aa9b498342381","lessThan":"101841c38346f4ca41dc1802c867da990ffb32eb","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ceph/crypto.c"],"versions":[{"version":"6.6","status":"affected"},{"version":"0","lessThan":"6.6","status":"unaffected","versionType":"semver"},{"version":"6.12.42","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.10","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.1","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6","versionEndExcluding":"6.12.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6","versionEndExcluding":"6.15.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6","versionEndExcluding":"6.16.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6","versionEndExcluding":"6.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/bb80f7618832d26f7e395f52f82b1dac76223e5f"},{"url":"https://git.kernel.org/stable/c/3145b2b11492d61c512bbc59660bb823bc757f48"},{"url":"https://git.kernel.org/stable/c/493479af8af3ab907f49e99323777d498a4fbd2b"},{"url":"https://git.kernel.org/stable/c/101841c38346f4ca41dc1802c867da990ffb32eb"}],"title":"[ceph] parse_longname(): strrchr() expects NUL-terminated string","x_generator":{"engine":"bippy-1.2.0"}}}}