CVE-2025-38342

In the Linux kernel, the following vulnerability has been resolved: software node: Correct a OOB check in software_node_get_reference_args() software_node_get_reference_args() wants to get @index-th element, so the property value requires at least '(index + 1) * sizeof(*ref)' bytes but that can not be guaranteed by current OOB check, and may cause OOB for malformed property. Fix by using as OOB check '((index + 1) * sizeof(*ref) > prop->length)'.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 17:48

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/142acd739eb6f08c148a96ae8309256f1422ff4b - () https://git.kernel.org/stable/c/142acd739eb6f08c148a96ae8309256f1422ff4b - Patch
References () https://git.kernel.org/stable/c/31e4e12e0e9609850cefd4b2e1adf782f56337d6 - () https://git.kernel.org/stable/c/31e4e12e0e9609850cefd4b2e1adf782f56337d6 - Patch
References () https://git.kernel.org/stable/c/4b3383110b6df48e0ba5936af2cb68d5eb6bd43b - () https://git.kernel.org/stable/c/4b3383110b6df48e0ba5936af2cb68d5eb6bd43b - Patch
References () https://git.kernel.org/stable/c/56ce76e8d406cc72b89aee7931df5cf3f18db49d - () https://git.kernel.org/stable/c/56ce76e8d406cc72b89aee7931df5cf3f18db49d - Patch
References () https://git.kernel.org/stable/c/7af18e42bdefe1dba5bcb32555a4d524fd504939 - () https://git.kernel.org/stable/c/7af18e42bdefe1dba5bcb32555a4d524fd504939 - Patch
References () https://git.kernel.org/stable/c/9324127b07dde8529222dc19233aa57ec810856c - () https://git.kernel.org/stable/c/9324127b07dde8529222dc19233aa57ec810856c - Patch
References () https://git.kernel.org/stable/c/f9397cf7bfb680799fb8c7f717c8f756384c3280 - () https://git.kernel.org/stable/c/f9397cf7bfb680799fb8c7f717c8f756384c3280 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nodo de software: Se corrige una comprobación OOB en software_node_get_reference_args(). software_node_get_reference_args() busca obtener el elemento @index-ésimo, por lo que el valor de la propiedad requiere al menos '(index + 1) * sizeof(*ref)' bytes, pero esto no se puede garantizar con la comprobación OOB actual y puede causar OOB para una propiedad mal formada. Se corrige usando como comprobación OOB '((index + 1) * sizeof(*ref) > prop->length)'.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 09:15

Updated : 2025-12-16 17:48


NVD link : CVE-2025-38342

Mitre link : CVE-2025-38342

CVE.ORG link : CVE-2025-38342


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read