Wind River Support Network

HomeDefectsLIN1024-10836
Acknowledged

LIN1024-10836 : Security Advisory - linux - CVE-2025-38538

Created: Aug 17, 2025    Updated: Aug 19, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]dmaengine: nbpfaxi: Fix memory corruption in probe()[EOL][EOL]The nbpf->chan[] array is allocated earlier in the nbpf_probe() function[EOL]and it has "num_channels" elements.  These three loops iterate one[EOL]element farther than they should and corrupt memory.[EOL][EOL]The changes to the second loop are more involved.  In this case, we're[EOL]copying data from the irqbuf[] array into the nbpf->chan[] array.  If[EOL]the data in irqbuf[i] is the error IRQ then we skip it, so the iterators[EOL]are not in sync.  I added a check to ensure that we don't go beyond the[EOL]end of the irqbuf[] array.  I'm pretty sure this can't happen, but it[EOL]seemed harmless to add a check.[EOL][EOL]On the other hand, after the loop has ended there is a check to ensure[EOL]that the "chan" iterator is where we expect it to be.  In the original[EOL]code we went one element beyond the end of the array so the iterator[EOL]wasn't in the correct place and it would always return -EINVAL.  However,[EOL]now it will always be in the correct place.  I deleted the check since[EOL]we know the result.

CREATE(Triage):(User=pbi-cn) [CVE-2025-38538 (https://nvd.nist.gov/vuln/detail/CVE-2025-38538)
Live chat
Online