Out-of-bounds Write Affecting kernel-zfcpdump-modules-partner package, versions *


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Write vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL9-KERNELZFCPDUMPMODULESPARTNER-14415196
  • published14 Dec 2025
  • disclosed12 Dec 2025

Introduced: 12 Dec 2025

NewCVE-2025-40345  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:9 kernel-zfcpdump-modules-partner.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-zfcpdump-modules-partner package and not the kernel-zfcpdump-modules-partner package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

usb: storage: sddr55: Reject out-of-bound new_pba

Discovered by Atuin - Automated Vulnerability Discovery Engine.

new_pba comes from the status packet returned after each write. A bogus device could report values beyond the block count derived from info->capacity, letting the driver walk off the end of pba_to_lba[] and corrupt heap memory.

Reject PBAs that exceed the computed block count and fail the transfer so we avoid touching out-of-range mapping entries.

CVSS Base Scores

version 3.1