In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Fix OOB memory read access in KUnit test
KASAN reported out of bounds access - cs_dsp_mock_bin_add_name_or_info(),
because the source string length was rounded up to the allocation size.
References
Configurations
History
18 Nov 2025, 12:52
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 | |
| References | () https://git.kernel.org/stable/c/8f4cc454a0bb45b800bc7817c09c8f72e31901f3 - Patch | |
| References | () https://git.kernel.org/stable/c/fe6446215bfad11cf3b446f38b28dc7708973c25 - Patch | |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
10 Jul 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-10 09:15
Updated : 2025-11-18 12:52
NVD link : CVE-2025-38340
Mitre link : CVE-2025-38340
CVE.ORG link : CVE-2025-38340
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
