๐Ÿ” CVE Alert

CVE-2025-38715

UNKNOWN 0.0

hfs: fix slab-out-of-bounds in hfs_bnode_read()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in hfs_bnode_read() This patch introduces is_bnode_offset_valid() method that checks the requested offset value. Also, it introduces check_and_correct_requested_length() method that checks and correct the requested length (if it is necessary). These methods are used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(), hfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent the access out of allocated memory and triggering the crash.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e7d2dc2421e821e4045775e6dc226378328de6f6 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 67ecc81f6492275c9c54280532f558483c99c90e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a1a60e79502279f996e55052f50cc14919020475 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fe2891a9c43ab87d1a210d61e6438ca6936e2f62 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 384a66b89f9540a9a8cb0f48807697dfabaece4c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < efc095b35b23297e419c2ab4fc1ed1a8f0781a29 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fc7f732984ec91f30be3e574e0644066d07f2b78 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < eec522fd0d28106b14a59ab2d658605febe4a3bb 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a431930c9bac518bf99d6b1da526a7f37ddee8d8
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6 git.kernel.org: https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e git.kernel.org: https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475 git.kernel.org: https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62 git.kernel.org: https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c git.kernel.org: https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29 git.kernel.org: https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78 git.kernel.org: https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb git.kernel.org: https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html