In the Linux kernel, the following vulnerability has been resolved:
[ceph] parse_longname(): strrchr() expects NUL-terminated string
... and parselongname() is not guaranteed that. That's the reason why it uses kmemdupnul() to build the argument for kstrtou64(); the problem is, kstrtou64() is not the only thing that need it.
Just get a NUL-terminated copy of the entire thing and be done with that...
[
{
"id": "CVE-2025-38660-3716ff3f",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"333942606433025950773895678076562067372",
"253583627024393542112303888476689796092",
"41597772511042752766956119778939785843",
"78337855123953636005699630218850439423",
"39502279874015890844467851440208351869",
"99693541254094779511813132478084718324",
"7163494683185636359198456128636024633",
"68951150642252900048142990350438121883",
"340261368096086117707614613535039094779",
"156290008169075554504640657887003257214",
"11765829410649654550235963363030038609",
"132524897977746551255100724021184668629",
"155005157811455713774098310352063272427",
"151566608928872687457339365304549671418",
"242855792217463885166563907247069571220",
"10384099957588795504529924736934823554",
"339644698777451846859469156709427808575",
"322777869593795351756716847377616656451",
"207462222596877084038939848229239565344",
"240507308059471959852921936290872403453",
"200587908078350051037470836032823488006",
"301004563164095395446611069610712105602",
"51576886104997955854310438472942416702",
"243172980513836214455912533398391610222",
"62800494649611974852887702918078370209",
"52850453494082138558045289003508528300",
"47041999392450008588178338627962418633",
"106746376781033749328579426043866822864",
"203929454512550471950935307891424959536",
"42973937187353357195802438902547228580",
"303667919687084938620087094511337298468",
"198954637952431343928375031634437791359",
"46807201942264224430831578505261870060"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@101841c38346f4ca41dc1802c867da990ffb32eb",
"target": {
"file": "fs/ceph/crypto.c"
}
},
{
"id": "CVE-2025-38660-f43fcf22",
"signature_version": "v1",
"digest": {
"function_hash": "137497004032377281113931029141777262145",
"length": 1054.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@101841c38346f4ca41dc1802c867da990ffb32eb",
"target": {
"file": "fs/ceph/crypto.c",
"function": "parse_longname"
}
}
]