VYPR
High severity7.1NVD Advisory· Published Jul 10, 2025· Updated May 12, 2026

CVE-2025-38342

CVE-2025-38342

Description

In the Linux kernel, the following vulnerability has been resolved:

software node: Correct a OOB check in software_node_get_reference_args()

software_node_get_reference_args() wants to get @index-th element, so the property value requires at least '(index + 1) * sizeof(*ref)' bytes but that can not be guaranteed by current OOB check, and may cause OOB for malformed property.

Fix by using as OOB check '((index + 1) * sizeof(*ref) > prop->length)'.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, an out-of-bounds (OOB) check in software_node_get_reference_args() can cause OOB access when parsing a malformed property.

Vulnerability

Description

In the Linux kernel, the function software_node_get_reference_args() in the software node subsystem had an incorrect out-of-bounds (OOB) check. The function retrieves the @index-th element from a reference property. The existing OOB check did not guarantee that the property value contained enough bytes for (index + 1) * sizeof(*ref), meaning a malformed property could trigger an OOB read [1].

Exploitation

To exploit this vulnerability, an attacker would need to be able to supply a specially crafted software node property to the kernel. This typically requires local access or the ability to load a misconfigured device tree or firmware description. No special privileges beyond that are necessary, as the flaw is in the kernel's parsing logic [1].

Impact

An out-of-bounds read can leak kernel memory or, in some cases, lead to a denial of service (system crash). The CVSS v3 score of 7.1 (High) reflects the potential for confidentiality impact and availability impact, though exploitation complexity is low [1].

Mitigation

The fix has been applied in the Linux kernel stable tree. Users should update to a kernel version that includes the commit correcting the OOB check. The Siemens advisory SSA-082556 lists affected products, including the SIMATIC S7-1500 CPU family and related ET 200 CPUs and SIPLUS variants, indicating these also require patching [1].

References
  1. SSA-082556

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.