CVE-2025-38676

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 22:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0ad8509b468fa1058f4f400a1829f29e4ccc4de8 - () https://git.kernel.org/stable/c/0ad8509b468fa1058f4f400a1829f29e4ccc4de8 - Patch
References () https://git.kernel.org/stable/c/4bdb0f78bddbfa77d3ab458a21dd9cec495d317a - () https://git.kernel.org/stable/c/4bdb0f78bddbfa77d3ab458a21dd9cec495d317a - Patch
References () https://git.kernel.org/stable/c/736db11c86f03e717fc4bf771d05efdf10d23acb - () https://git.kernel.org/stable/c/736db11c86f03e717fc4bf771d05efdf10d23acb - Patch
References () https://git.kernel.org/stable/c/8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec - () https://git.kernel.org/stable/c/8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec - Patch
References () https://git.kernel.org/stable/c/8f80c633cba144f721d38d9380f23d23ab7db10e - () https://git.kernel.org/stable/c/8f80c633cba144f721d38d9380f23d23ab7db10e - Patch
References () https://git.kernel.org/stable/c/9ff52d3af0ef286535749e14e3fe9eceb39a8349 - () https://git.kernel.org/stable/c/9ff52d3af0ef286535749e14e3fe9eceb39a8349 - Patch
References () https://git.kernel.org/stable/c/a732502bf3bbe859613b6d7b2b0313b11f0474ac - () https://git.kernel.org/stable/c/a732502bf3bbe859613b6d7b2b0313b11f0474ac - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0ad8509b468fa1058f4f400a1829f29e4ccc4de8 -
  • () https://git.kernel.org/stable/c/4bdb0f78bddbfa77d3ab458a21dd9cec495d317a -
  • () https://git.kernel.org/stable/c/736db11c86f03e717fc4bf771d05efdf10d23acb -
  • () https://git.kernel.org/stable/c/8f80c633cba144f721d38d9380f23d23ab7db10e -
  • () https://git.kernel.org/stable/c/9ff52d3af0ef286535749e14e3fe9eceb39a8349 -
  • () https://git.kernel.org/stable/c/a732502bf3bbe859613b6d7b2b0313b11f0474ac -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/amd: evitar el desbordamiento del búfer de pila desde la línea de comandos del kernel. Si bien la línea de comandos del kernel se considera confiable en la mayoría de los entornos, evite escribir 1 byte después del final de "acpiid" si el argumento "str" tiene la longitud máxima.

26 Aug 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-26 13:15

Updated : 2026-01-08 22:30


NVD link : CVE-2025-38676

Mitre link : CVE-2025-38676

CVE.ORG link : CVE-2025-38676


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write