CVE-2025-22044
Severity CVSS v4.0:
Pending analysis
Type:
CWE-704
Incorrect Type Conversion or Cast
Publication date:
16/04/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
acpi: nfit: fix narrowing conversion in acpi_nfit_ctl<br />
<br />
Syzkaller has reported a warning in to_nfit_bus_uuid(): "only secondary<br />
bus families can be translated". This warning is emited if the argument<br />
is equal to NVDIMM_BUS_FAMILY_NFIT == 0. Function acpi_nfit_ctl() first<br />
verifies that a user-provided value call_pkg->nd_family of type u64 is<br />
not equal to 0. Then the value is converted to int, and only after that<br />
is compared to NVDIMM_BUS_FAMILY_MAX. This can lead to passing an invalid<br />
argument to acpi_nfit_ctl(), if call_pkg->nd_family is non-zero, while<br />
the lower 32 bits are zero.<br />
<br />
Furthermore, it is best to return EINVAL immediately upon seeing the<br />
invalid user input. The WARNING is insufficient to prevent further<br />
undefined behavior based on other invalid user input.<br />
<br />
All checks of the input value should be applied to the original variable<br />
call_pkg->nd_family.<br />
<br />
[iweiny: update commit message]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.236 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.180 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.87 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ff0e408db36c21ed3fa5e3c1e0e687c82cf132f
- https://git.kernel.org/stable/c/4b65cff06a004ac54f6ea8886060f0d07b1ca055
- https://git.kernel.org/stable/c/73851cfceb00cc77d7a0851bc10f2263394c3e87
- https://git.kernel.org/stable/c/85f11291658ab907c4294319c8102450cc75bb96
- https://git.kernel.org/stable/c/92ba06aef65522483784dcbd6697629ddbd4c4f9
- https://git.kernel.org/stable/c/bae5b55e0f327102e78f6a66fb127275e9bc91b6
- https://git.kernel.org/stable/c/c90402d2a226ff7afbe1d0650bee8ecc15a91049
- https://git.kernel.org/stable/c/e71a57c5aaa389d4c3c82f920761262efdd18d38
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



