CVE-2025-38391

In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmodes/displayport: do not index invalid pin_assignments A poorly implemented DisplayPort Alt Mode port partner can indicate that its pin assignment capabilities are greater than the maximum value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show will cause a BRK exception due to an out of bounds array access. Prevent for loop in pin_assignment_show from accessing invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX value in typec_dp.h and using i < DP_PIN_ASSIGN_MAX as a loop condition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

23 Dec 2025, 19:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-125
References () https://git.kernel.org/stable/c/114a977e0f6bf278e05eade055e13fc271f69cf7 - () https://git.kernel.org/stable/c/114a977e0f6bf278e05eade055e13fc271f69cf7 - Patch
References () https://git.kernel.org/stable/c/2f535517b5611b7221ed478527e4b58e29536ddf - () https://git.kernel.org/stable/c/2f535517b5611b7221ed478527e4b58e29536ddf - Patch
References () https://git.kernel.org/stable/c/45e9444b3b97eaf51a5024f1fea92f44f39b50c6 - () https://git.kernel.org/stable/c/45e9444b3b97eaf51a5024f1fea92f44f39b50c6 - Patch
References () https://git.kernel.org/stable/c/47cb5d26f61d80c805d7de4106451153779297a1 - () https://git.kernel.org/stable/c/47cb5d26f61d80c805d7de4106451153779297a1 - Patch
References () https://git.kernel.org/stable/c/5581e694d3a1c2f32c5a51d745c55b107644e1f8 - () https://git.kernel.org/stable/c/5581e694d3a1c2f32c5a51d745c55b107644e1f8 - Patch
References () https://git.kernel.org/stable/c/621d5a3ef0231ab242f2d31eecec40c38ca609c5 - () https://git.kernel.org/stable/c/621d5a3ef0231ab242f2d31eecec40c38ca609c5 - Patch
References () https://git.kernel.org/stable/c/af4db5a35a4ef7a68046883bfd12468007db38f1 - () https://git.kernel.org/stable/c/af4db5a35a4ef7a68046883bfd12468007db38f1 - Patch
References () https://git.kernel.org/stable/c/c93bc959788ed9a1af7df57cb539837bdf790cee - () https://git.kernel.org/stable/c/c93bc959788ed9a1af7df57cb539837bdf790cee - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: altmodes/displayport: no indexar asignaciones de pines no válidas. Un puerto asociado DisplayPort en modo alternativo mal implementado puede indicar que su capacidad de asignación de pines supera el valor máximo, DP_PIN_ASSIGN_F. En este caso, las llamadas a pin_assignment_show provocarán una excepción BRK debido a un acceso fuera de los límites de la matriz. Para evitar que el bucle for de pin_assignment_show acceda a valores no válidos en las asignaciones de pines, agregue el valor DP_PIN_ASSIGN_MAX en typec_dp.h y use i &lt; DP_PIN_ASSIGN_MAX como condición de bucle.

25 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 13:15

Updated : 2025-12-23 19:28


NVD link : CVE-2025-38391

Mitre link : CVE-2025-38391

CVE.ORG link : CVE-2025-38391


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read