In the Linux kernel, the following vulnerability has been resolved:
clk: imx: Fix an out-of-bounds access in dispmixcsrclkdevdata
When num_parents is 4, _clkregister() occurs an out-of-bounds when accessing parentnames member. Use ARRAYSIZE() instead of hardcode number here.
BUG: KASAN: global-out-of-bounds in __clkregister+0x1844/0x20d8 Read of size 8 at addr ffff800086988e78 by task kworker/u24:3/59 Hardware name: NXP i.MX95 19X19 board (DT) Workqueue: eventsunbound deferred_probeworkfunc Call trace: dumpbacktrace+0x94/0xec showstack+0x18/0x24 dumpstacklvl+0x8c/0xcc printreport+0x398/0x5fc kasanreport+0xd4/0x114 __asanreportload8_noabort+0x20/0x2c __clkregister+0x1844/0x20d8 clkhw_register+0x44/0x110 _clkhwregistermux+0x284/0x3a8 imx95bcprobe+0x4f4/0xa70
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38446.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38446.json"
[
{
"signature_type": "Line",
"target": {
"file": "drivers/clk/imx/clk-imx95-blk-ctl.c"
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aacc875a448d363332b9df0621dde6d3a225ea9f",
"id": "CVE-2025-38446-abb73914",
"digest": {
"line_hashes": [
"337123165093039141281017625947864398604",
"332207271507320948655505978716295248892",
"265641892337886185169825053692479924668",
"173572024997233545296447312594565382818",
"312625312489761237420161494163859414982",
"115995872449281532557989837852047372558",
"175527056115584036247569541038635336164",
"52249334718988377026853178491921546654",
"231205833006463329886234305308451294776",
"326589052657141834856739496384301071848",
"122290178494830542038459369873970033328",
"3849025236310290744066035652307517785",
"33179573486255303736265573150049979343"
],
"threshold": 0.9
},
"signature_version": "v1"
}
]