CVE-2025-38715
hfs: fix slab-out-of-bounds in hfs_bnode_read()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in hfs_bnode_read() This patch introduces is_bnode_offset_valid() method that checks the requested offset value. Also, it introduces check_and_correct_requested_length() method that checks and correct the requested length (if it is necessary). These methods are used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(), hfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent the access out of allocated memory and triggering the crash.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 4, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e7d2dc2421e821e4045775e6dc226378328de6f6 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 67ecc81f6492275c9c54280532f558483c99c90e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a1a60e79502279f996e55052f50cc14919020475 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fe2891a9c43ab87d1a210d61e6438ca6936e2f62 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 384a66b89f9540a9a8cb0f48807697dfabaece4c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < efc095b35b23297e419c2ab4fc1ed1a8f0781a29 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fc7f732984ec91f30be3e574e0644066d07f2b78 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < eec522fd0d28106b14a59ab2d658605febe4a3bb 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a431930c9bac518bf99d6b1da526a7f37ddee8d8
Linux / Linux
2.6.12
References
git.kernel.org: https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6 git.kernel.org: https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e git.kernel.org: https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475 git.kernel.org: https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62 git.kernel.org: https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c git.kernel.org: https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29 git.kernel.org: https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78 git.kernel.org: https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb git.kernel.org: https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html