{"vulnerability": "CVE-2025-38065", "sightings": [{"uuid": "20d5d000-b84a-4647-9103-4ea3b8cea4b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38065", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18716", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38065\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: Do not truncate file size\n\n'len' is used to store the result of i_size_read(), so making 'len'\na size_t results in truncation to 4GiB on 32-bit systems.\n\ud83d\udccf Published: 2025-06-18T09:33:44.048Z\n\ud83d\udccf Modified: 2025-06-18T09:33:44.048Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/ceaf195ed285b77791e29016ee6344b3ded609b3\n2. https://git.kernel.org/stable/c/341e3a5984cf5761f3dab16029d7e9fb1641d5ff\n3. https://git.kernel.org/stable/c/5111227d7f1f57f6804666b3abf780a23f44fc1d\n4. https://git.kernel.org/stable/c/15602508ad2f923e228b9521960b4addcd27d9c4\n5. https://git.kernel.org/stable/c/121f0335d91e46369bf55b5da4167d82b099a166\n6. https://git.kernel.org/stable/c/cd918ec24168fe08c6aafc077dd3b6d88364c5cf\n7. https://git.kernel.org/stable/c/2323b806221e6268a4e17711bc72e2fc87c191a3\n8. https://git.kernel.org/stable/c/062e8093592fb866b8e016641a8b27feb6ac509d", "creation_timestamp": "2025-06-18T10:40:18.000000Z"}, {"uuid": "3f7d7ab1-4fdc-4cf5-9d77-9bf1277a63bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38065", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lruys2yfny25", "content": "", "creation_timestamp": "2025-06-18T12:22:52.281061Z"}]}