CVE-2025-38342
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
10/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
software node: Correct a OOB check in software_node_get_reference_args()<br />
<br />
software_node_get_reference_args() wants to get @index-th element, so<br />
the property value requires at least &#39;(index + 1) * sizeof(*ref)&#39; bytes<br />
but that can not be guaranteed by current OOB check, and may cause OOB<br />
for malformed property.<br />
<br />
Fix by using as OOB check &#39;((index + 1) * sizeof(*ref) > prop->length)&#39;.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/142acd739eb6f08c148a96ae8309256f1422ff4b
- https://git.kernel.org/stable/c/31e4e12e0e9609850cefd4b2e1adf782f56337d6
- https://git.kernel.org/stable/c/4b3383110b6df48e0ba5936af2cb68d5eb6bd43b
- https://git.kernel.org/stable/c/56ce76e8d406cc72b89aee7931df5cf3f18db49d
- https://git.kernel.org/stable/c/7af18e42bdefe1dba5bcb32555a4d524fd504939
- https://git.kernel.org/stable/c/9324127b07dde8529222dc19233aa57ec810856c
- https://git.kernel.org/stable/c/f9397cf7bfb680799fb8c7f717c8f756384c3280
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



