CVE-2025-38425

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: check msg length in SMBUS block read For SMBUS block read, do not continue to read if the message length passed from the device is '0' or greater than the maximum allowed bytes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

23 Dec 2025, 18:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3f03f77ce688d02da284174e1884b6065d6159bd - () https://git.kernel.org/stable/c/3f03f77ce688d02da284174e1884b6065d6159bd - Patch
References () https://git.kernel.org/stable/c/75a864f21ceeb8c1e8ce1b7589174fec2c3a039e - () https://git.kernel.org/stable/c/75a864f21ceeb8c1e8ce1b7589174fec2c3a039e - Patch
References () https://git.kernel.org/stable/c/a6e04f05ce0b070ab39d5775580e65c7d943da0b - () https://git.kernel.org/stable/c/a6e04f05ce0b070ab39d5775580e65c7d943da0b - Patch
References () https://git.kernel.org/stable/c/be5f6a65509cd5675362f15eb0440fb28b0f9d64 - () https://git.kernel.org/stable/c/be5f6a65509cd5675362f15eb0440fb28b0f9d64 - Patch
References () https://git.kernel.org/stable/c/c39d1a9ae4ad66afcecab124d7789722bfe909fa - () https://git.kernel.org/stable/c/c39d1a9ae4ad66afcecab124d7789722bfe909fa - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: tegra: verificar la longitud del mensaje en la lectura del bloque SMBUS Para la lectura del bloque SMBUS, no continúe leyendo si la longitud del mensaje pasado desde el dispositivo es '0' o mayor que el máximo de bytes permitidos.

25 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-25 15:15

Updated : 2025-12-23 18:35


NVD link : CVE-2025-38425

Mitre link : CVE-2025-38425

CVE.ORG link : CVE-2025-38425


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel