VYPR
High severity7.1NVD Advisory· Published Sep 4, 2025· Updated May 12, 2026

CVE-2025-38715

CVE-2025-38715

Description

In the Linux kernel, the following vulnerability has been resolved:

hfs: fix slab-out-of-bounds in hfs_bnode_read()

This patch introduces is_bnode_offset_valid() method that checks the requested offset value. Also, it introduces check_and_correct_requested_length() method that checks and correct the requested length (if it is necessary). These methods are used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(), hfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent the access out of allocated memory and triggering the crash.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A slab-out-of-bounds vulnerability in Linux kernel's HFS filesystem (hfs_bnode_read) allows out-of-bounds memory access, fixed by adding offset and length validation.

Vulnerability

Details

The Linux kernel's HFS filesystem implementation contains a slab-out-of-bounds vulnerability in the hfs_bnode_read() function. The issue arises because the function does not validate the offset and length parameters before accessing the bnode data buffer, potentially leading to reads beyond the allocated memory. The fix introduces two new helper functions: is_bnode_offset_valid() checks the requested offset, and check_and_correct_requested_length() ensures the length does not exceed the buffer boundaries.

Exploitation

An attacker could exploit this vulnerability by mounting a specially crafted HFS filesystem image that triggers an out-of-bounds read when the kernel attempts to read a bnode with an invalid offset or length. The attack requires the ability to mount a malicious HFS filesystem, which typically necessitates local access or the ability to insert a storage device.

Impact

Successful exploitation could lead to a kernel crash (denial of service) or potentially information disclosure if the out-of-bounds read accesses sensitive kernel memory. The CVSS score of 7.1 (High) reflects the potential for significant impact.

Mitigation

The fix has been committed to the Linux kernel stable tree. Users should update to the latest kernel version containing the patch. This vulnerability is also listed in Siemens advisory SSA-032379 [1], which identifies affected Siemens products such as SIMATIC CN 4100.

References
  1. SSA-032379

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

1