CVE-2025-38342
Description
In the Linux kernel, the following vulnerability has been resolved:
software node: Correct a OOB check in software_node_get_reference_args()
software_node_get_reference_args() wants to get @index-th element, so the property value requires at least '(index + 1) * sizeof(*ref)' bytes but that can not be guaranteed by current OOB check, and may cause OOB for malformed property.
Fix by using as OOB check '((index + 1) * sizeof(*ref) > prop->length)'.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, an out-of-bounds (OOB) check in software_node_get_reference_args() can cause OOB access when parsing a malformed property.
Vulnerability
Description
In the Linux kernel, the function software_node_get_reference_args() in the software node subsystem had an incorrect out-of-bounds (OOB) check. The function retrieves the @index-th element from a reference property. The existing OOB check did not guarantee that the property value contained enough bytes for (index + 1) * sizeof(*ref), meaning a malformed property could trigger an OOB read [1].
Exploitation
To exploit this vulnerability, an attacker would need to be able to supply a specially crafted software node property to the kernel. This typically requires local access or the ability to load a misconfigured device tree or firmware description. No special privileges beyond that are necessary, as the flaw is in the kernel's parsing logic [1].
Impact
An out-of-bounds read can leak kernel memory or, in some cases, lead to a denial of service (system crash). The CVSS v3 score of 7.1 (High) reflects the potential for confidentiality impact and availability impact, though exploitation complexity is low [1].
Mitigation
The fix has been applied in the Linux kernel stable tree. Users should update to a kernel version that includes the commit correcting the OOB check. The Siemens advisory SSA-082556 lists affected products, including the SIMATIC S7-1500 CPU family and related ET 200 CPUs and SIPLUS variants, indicating these also require patching [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 5.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- git.kernel.org/stable/c/142acd739eb6f08c148a96ae8309256f1422ff4bnvdPatch
- git.kernel.org/stable/c/31e4e12e0e9609850cefd4b2e1adf782f56337d6nvdPatch
- git.kernel.org/stable/c/4b3383110b6df48e0ba5936af2cb68d5eb6bd43bnvdPatch
- git.kernel.org/stable/c/56ce76e8d406cc72b89aee7931df5cf3f18db49dnvdPatch
- git.kernel.org/stable/c/7af18e42bdefe1dba5bcb32555a4d524fd504939nvdPatch
- git.kernel.org/stable/c/9324127b07dde8529222dc19233aa57ec810856cnvdPatch
- git.kernel.org/stable/c/f9397cf7bfb680799fb8c7f717c8f756384c3280nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlnvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-082556.htmlnvd
News mentions
0No linked articles in our index yet.