CVE-2025-38342

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38342
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38342.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38342
Downstream
Related
Published
2025-07-10T08:15:11.561Z
Modified
2025-11-28T02:34:49.701118Z
Summary
software node: Correct a OOB check in software_node_get_reference_args()
Details

In the Linux kernel, the following vulnerability has been resolved:

software node: Correct a OOB check in softwarenodegetreferenceargs()

softwarenodegetreferenceargs() wants to get @index-th element, so the property value requires at least '(index + 1) * sizeof(*ref)' bytes but that can not be guaranteed by current OOB check, and may cause OOB for malformed property.

Fix by using as OOB check '((index + 1) * sizeof(*ref) > prop->length)'.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38342.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
59abd83672f70cac4b6bf9b237506c5bc6837606
Fixed
142acd739eb6f08c148a96ae8309256f1422ff4b
Fixed
56ce76e8d406cc72b89aee7931df5cf3f18db49d
Fixed
9324127b07dde8529222dc19233aa57ec810856c
Fixed
f9397cf7bfb680799fb8c7f717c8f756384c3280
Fixed
4b3383110b6df48e0ba5936af2cb68d5eb6bd43b
Fixed
7af18e42bdefe1dba5bcb32555a4d524fd504939
Fixed
31e4e12e0e9609850cefd4b2e1adf782f56337d6

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.10.239
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.186
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.142
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.95
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.35
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.4