In the Linux kernel, the following vulnerability has been resolved:
usb: typec: altmodes/displayport: do not index invalid pin_assignments
A poorly implemented DisplayPort Alt Mode port partner can indicate
that its pin assignment capabilities are greater than the maximum
value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show
will cause a BRK exception due to an out of bounds array access.
Prevent for loop in pin_assignment_show from accessing
invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX
value in typec_dp.h and using i < DP_PIN_ASSIGN_MAX as a loop
condition.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2025, 19:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-125 | |
| References | () https://git.kernel.org/stable/c/114a977e0f6bf278e05eade055e13fc271f69cf7 - Patch | |
| References | () https://git.kernel.org/stable/c/2f535517b5611b7221ed478527e4b58e29536ddf - Patch | |
| References | () https://git.kernel.org/stable/c/45e9444b3b97eaf51a5024f1fea92f44f39b50c6 - Patch | |
| References | () https://git.kernel.org/stable/c/47cb5d26f61d80c805d7de4106451153779297a1 - Patch | |
| References | () https://git.kernel.org/stable/c/5581e694d3a1c2f32c5a51d745c55b107644e1f8 - Patch | |
| References | () https://git.kernel.org/stable/c/621d5a3ef0231ab242f2d31eecec40c38ca609c5 - Patch | |
| References | () https://git.kernel.org/stable/c/af4db5a35a4ef7a68046883bfd12468007db38f1 - Patch | |
| References | () https://git.kernel.org/stable/c/c93bc959788ed9a1af7df57cb539837bdf790cee - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
25 Jul 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 13:15
Updated : 2025-12-23 19:28
NVD link : CVE-2025-38391
Mitre link : CVE-2025-38391
CVE.ORG link : CVE-2025-38391
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
