CVE-2025-38072
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
17/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
libnvdimm/labels: Fix divide error in nd_label_data_init()<br />
<br />
If a faulty CXL memory device returns a broken zero LSA size in its<br />
memory device information (Identify Memory Device (Opcode 4000h), CXL<br />
spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm<br />
driver:<br />
<br />
Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI<br />
RIP: 0010:nd_label_data_init+0x10e/0x800 [libnvdimm]<br />
<br />
Code and flow:<br />
<br />
1) CXL Command 4000h returns LSA size = 0<br />
2) config_size is assigned to zero LSA size (CXL pmem driver):<br />
<br />
drivers/cxl/pmem.c: .config_size = mds->lsa_size,<br />
<br />
3) max_xfer is set to zero (nvdimm driver):<br />
<br />
drivers/nvdimm/label.c: max_xfer = min_t(size_t, ndd->nsarea.max_xfer, config_size);<br />
<br />
4) A subsequent DIV_ROUND_UP() causes a division by zero:<br />
<br />
drivers/nvdimm/label.c: /* Make our initial read size a multiple of max_xfer size */<br />
drivers/nvdimm/label.c: read_size = min(DIV_ROUND_UP(read_size, max_xfer) * max_xfer,<br />
drivers/nvdimm/label.c- config_size);<br />
<br />
Fix this by checking the config size parameter by extending an<br />
existing check.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.294 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.238 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.185 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.141 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.9 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1d1e1efad1cf049e888bf175a5c6be85d792620c
- https://git.kernel.org/stable/c/2bd4a938d2eda96ab7288b8fa5aae84a1de8c4ca
- https://git.kernel.org/stable/c/396c46d3f59a18ebcc500640e749f16e197d472b
- https://git.kernel.org/stable/c/db1aef51b8e66a77f76b1250b914589c31a0a0ed
- https://git.kernel.org/stable/c/e14347f647ca6d76fe1509b6703e340f2d5e2716
- https://git.kernel.org/stable/c/ea3d95e05e97ea20fd6513f647393add16fce3b2
- https://git.kernel.org/stable/c/ef1d3455bbc1922f94a91ed58d3d7db440652959
- https://git.kernel.org/stable/c/f49c337037df029440a8390380dd35d2cf5924d3
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



