Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38715
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-04 Sep, 2025 | 15:33
Updated At-02 Jan, 2026 | 15:31
Rejected At-
▼CVE Numbering Authority (CNA)
hfs: fix slab-out-of-bounds in hfs_bnode_read()

In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in hfs_bnode_read() This patch introduces is_bnode_offset_valid() method that checks the requested offset value. Also, it introduces check_and_correct_requested_length() method that checks and correct the requested length (if it is necessary). These methods are used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(), hfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent the access out of allocated memory and triggering the crash.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/hfs/bnode.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e7d2dc2421e821e4045775e6dc226378328de6f6 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 67ecc81f6492275c9c54280532f558483c99c90e (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a1a60e79502279f996e55052f50cc14919020475 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before fe2891a9c43ab87d1a210d61e6438ca6936e2f62 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 384a66b89f9540a9a8cb0f48807697dfabaece4c (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before efc095b35b23297e419c2ab4fc1ed1a8f0781a29 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before fc7f732984ec91f30be3e574e0644066d07f2b78 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before eec522fd0d28106b14a59ab2d658605febe4a3bb (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a431930c9bac518bf99d6b1da526a7f37ddee8d8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/hfs/bnode.c
Default Status
affected
Versions
Affected
  • 2.6.12
Unaffected
  • From 0 before 2.6.12 (semver)
  • From 5.4.297 through 5.4.* (semver)
  • From 5.10.241 through 5.10.* (semver)
  • From 5.15.190 through 5.15.* (semver)
  • From 6.1.149 through 6.1.* (semver)
  • From 6.6.103 through 6.6.* (semver)
  • From 6.12.43 through 6.12.* (semver)
  • From 6.15.11 through 6.15.* (semver)
  • From 6.16.2 through 6.16.* (semver)
  • From 6.17 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6
N/A
https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e
N/A
https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475
N/A
https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62
N/A
https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c
N/A
https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29
N/A
https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78
N/A
https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb
N/A
https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8
N/A
Hyperlink: https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Resource: N/A
Details not found