CVE-2025-38538
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue in the Linux kernel's dmaengine nbpfaxi driver. Specifically, the nbpf->chan[] array is allocated with a certain number of elements, but three loops in the nbpf_probe() function iterate one element too far, causing memory corruption. Additionally, when copying data from the irqbuf[] array to the nbpf->chan[] array, the code skips error IRQ entries, which causes the iterators to become unsynchronized. A check was added to prevent going beyond the end of the irqbuf[] array, and a redundant check after the loop was removed because the iterator position is now guaranteed to be correct.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.