-

CVE-2025-38538

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: nbpfaxi: Fix memory corruption in probe()

The nbpf->chan[] array is allocated earlier in the nbpf_probe() function
and it has "num_channels" elements.  These three loops iterate one
element farther than they should and corrupt memory.

The changes to the second loop are more involved.  In this case, we're
copying data from the irqbuf[] array into the nbpf->chan[] array.  If
the data in irqbuf[i] is the error IRQ then we skip it, so the iterators
are not in sync.  I added a check to ensure that we don't go beyond the
end of the irqbuf[] array.  I'm pretty sure this can't happen, but it
seemed harmless to add a check.

On the other hand, after the loop has ended there is a check to ensure
that the "chan" iterator is where we expect it to be.  In the original
code we went one element beyond the end of the array so the iterator
wasn't in the correct place and it would always return -EINVAL.  However,
now it will always be in the correct place.  I deleted the check since
we know the result.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 84fff8e6f11b9af1407e273995b5257d99ff0cff
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < aec396b4f736f3f8d2c28a9cd2924a4ada57ae87
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < 24861ef8b517a309a4225f2793be0cd8fa0bec9e
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < f366b36c5e3ce29c9a3c8eed3d1631908e4fc8bb
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < 4bb016438335ec02b01f96bf1367378c2bfe03e5
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < 122160289adf8ebf15060f1cbf6265b55a914948
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < d6bbd67ab5de37a74ac85c83c5a26664b62034dd
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
Version < 188c6ba1dd925849c5d94885c8bbdeb0b3dcf510
Version b45b262cefd5b8eb2ba88d20e5bd295881293894
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.17
Status affected
Version < 3.17
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.147
Status unaffected
Version <= 6.6.*
Version 6.6.100
Status unaffected
Version <= 6.12.*
Version 6.12.40
Status unaffected
Version <= 6.15.*
Version 6.15.8
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.088
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string