๐Ÿ” CVE Alert

CVE-2025-38538

UNKNOWN 0.0

dmaengine: nbpfaxi: Fix memory corruption in probe()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: dmaengine: nbpfaxi: Fix memory corruption in probe() The nbpf->chan[] array is allocated earlier in the nbpf_probe() function and it has "num_channels" elements. These three loops iterate one element farther than they should and corrupt memory. The changes to the second loop are more involved. In this case, we're copying data from the irqbuf[] array into the nbpf->chan[] array. If the data in irqbuf[i] is the error IRQ then we skip it, so the iterators are not in sync. I added a check to ensure that we don't go beyond the end of the irqbuf[] array. I'm pretty sure this can't happen, but it seemed harmless to add a check. On the other hand, after the loop has ended there is a check to ensure that the "chan" iterator is where we expect it to be. In the original code we went one element beyond the end of the array so the iterator wasn't in the correct place and it would always return -EINVAL. However, now it will always be in the correct place. I deleted the check since we know the result.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b45b262cefd5b8eb2ba88d20e5bd295881293894 < 84fff8e6f11b9af1407e273995b5257d99ff0cff b45b262cefd5b8eb2ba88d20e5bd295881293894 < aec396b4f736f3f8d2c28a9cd2924a4ada57ae87 b45b262cefd5b8eb2ba88d20e5bd295881293894 < 24861ef8b517a309a4225f2793be0cd8fa0bec9e b45b262cefd5b8eb2ba88d20e5bd295881293894 < f366b36c5e3ce29c9a3c8eed3d1631908e4fc8bb b45b262cefd5b8eb2ba88d20e5bd295881293894 < 4bb016438335ec02b01f96bf1367378c2bfe03e5 b45b262cefd5b8eb2ba88d20e5bd295881293894 < 122160289adf8ebf15060f1cbf6265b55a914948 b45b262cefd5b8eb2ba88d20e5bd295881293894 < d6bbd67ab5de37a74ac85c83c5a26664b62034dd b45b262cefd5b8eb2ba88d20e5bd295881293894 < 188c6ba1dd925849c5d94885c8bbdeb0b3dcf510
Linux / Linux
3.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/84fff8e6f11b9af1407e273995b5257d99ff0cff git.kernel.org: https://git.kernel.org/stable/c/aec396b4f736f3f8d2c28a9cd2924a4ada57ae87 git.kernel.org: https://git.kernel.org/stable/c/24861ef8b517a309a4225f2793be0cd8fa0bec9e git.kernel.org: https://git.kernel.org/stable/c/f366b36c5e3ce29c9a3c8eed3d1631908e4fc8bb git.kernel.org: https://git.kernel.org/stable/c/4bb016438335ec02b01f96bf1367378c2bfe03e5 git.kernel.org: https://git.kernel.org/stable/c/122160289adf8ebf15060f1cbf6265b55a914948 git.kernel.org: https://git.kernel.org/stable/c/d6bbd67ab5de37a74ac85c83c5a26664b62034dd git.kernel.org: https://git.kernel.org/stable/c/188c6ba1dd925849c5d94885c8bbdeb0b3dcf510 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html