CVE-2025-38340

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38340
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38340.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38340
Downstream
Published
2025-07-10T08:15:10.285Z
Modified
2025-11-20T09:21:38.491781Z
Summary
firmware: cs_dsp: Fix OOB memory read access in KUnit test
Details

In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Fix OOB memory read access in KUnit test

KASAN reported out of bounds access - csdspmockbinaddnameor_info(), because the source string length was rounded up to the allocation size.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7c052c6615297ff32032105130cd5f02059f7ae4
Fixed
8f4cc454a0bb45b800bc7817c09c8f72e31901f3
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7c052c6615297ff32032105130cd5f02059f7ae4
Fixed
fe6446215bfad11cf3b446f38b28dc7708973c25

Affected versions

v6.*

v6.13
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.15.1
v6.15.2
v6.15.3

Database specific

vanir_signatures

[
    {
        "target": {
            "file": "drivers/firmware/cirrus/test/cs_dsp_mock_bin.c"
        },
        "digest": {
            "line_hashes": [
                "224217240597655194556377610964125728089",
                "193332046569729949322695033665338807613",
                "110040657670279264295905510376404627946",
                "46971705952927238395347767754670311738",
                "192480875725646711937118059429038012145",
                "4640851437170383798941343250061730158",
                "101736795178056632861364138753044363947"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8f4cc454a0bb45b800bc7817c09c8f72e31901f3",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2025-38340-01fc2ab1"
    },
    {
        "target": {
            "function": "cs_dsp_mock_bin_add_name_or_info",
            "file": "drivers/firmware/cirrus/test/cs_dsp_mock_bin.c"
        },
        "digest": {
            "length": 455.0,
            "function_hash": "4582607723218445475965051971024503322"
        },
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe6446215bfad11cf3b446f38b28dc7708973c25",
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2025-38340-6a3822a9"
    },
    {
        "target": {
            "function": "cs_dsp_mock_bin_add_name_or_info",
            "file": "drivers/firmware/cirrus/test/cs_dsp_mock_bin.c"
        },
        "digest": {
            "length": 455.0,
            "function_hash": "4582607723218445475965051971024503322"
        },
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8f4cc454a0bb45b800bc7817c09c8f72e31901f3",
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2025-38340-874a09e3"
    },
    {
        "target": {
            "file": "drivers/firmware/cirrus/test/cs_dsp_mock_bin.c"
        },
        "digest": {
            "line_hashes": [
                "224217240597655194556377610964125728089",
                "193332046569729949322695033665338807613",
                "110040657670279264295905510376404627946",
                "46971705952927238395347767754670311738",
                "192480875725646711937118059429038012145",
                "4640851437170383798941343250061730158",
                "101736795178056632861364138753044363947"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe6446215bfad11cf3b446f38b28dc7708973c25",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2025-38340-d8144fea"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.15.4