In the Linux kernel, the following vulnerability has been resolved:
i2c: tegra: check msg length in SMBUS block read
For SMBUS block read, do not continue to read if the message length
passed from the device is '0' or greater than the maximum allowed bytes.
References
Configurations
History
23 Dec 2025, 18:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/3f03f77ce688d02da284174e1884b6065d6159bd - Patch | |
| References | () https://git.kernel.org/stable/c/75a864f21ceeb8c1e8ce1b7589174fec2c3a039e - Patch | |
| References | () https://git.kernel.org/stable/c/a6e04f05ce0b070ab39d5775580e65c7d943da0b - Patch | |
| References | () https://git.kernel.org/stable/c/be5f6a65509cd5675362f15eb0440fb28b0f9d64 - Patch | |
| References | () https://git.kernel.org/stable/c/c39d1a9ae4ad66afcecab124d7789722bfe909fa - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
25 Jul 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-25 15:15
Updated : 2025-12-23 18:35
NVD link : CVE-2025-38425
Mitre link : CVE-2025-38425
CVE.ORG link : CVE-2025-38425
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
