In the Linux kernel, the following vulnerability has been resolved: software node: Correct a OOB check in software_node_get_reference_args() software_node_get_reference_args() wants to get @index-th element, so the property value requires at least '(index + 1) * sizeof(*ref)' bytes but that can not be guaranteed by current OOB check, and may cause OOB for malformed property. Fix by using as OOB check '((index + 1) * sizeof(*ref) > prop->length)'.
2025-07-10T09:15:29.017
2025-07-10T13:17:30.017
Awaiting Analysis
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
-
-