Home

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-26 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

f2a5ec7f7b28f9b9cd5fac232ff51019a7f7b9e9 before a732502bf3bbe859613b6d7b2b0313b11f0474ac
affected

c513043e0afe6a8ba79d00af358655afabb576d2 before 0ad8509b468fa1058f4f400a1829f29e4ccc4de8
affected

2ae19ac3ea82a5b87a81c10adbb497c9e58bdd60 before 9ff52d3af0ef286535749e14e3fe9eceb39a8349
affected

b6b26d86c61c441144c72f842f7469bb686e1211 before 8f80c633cba144f721d38d9380f23d23ab7db10e
affected

b6b26d86c61c441144c72f842f7469bb686e1211 before 4bdb0f78bddbfa77d3ab458a21dd9cec495d317a
affected

b6b26d86c61c441144c72f842f7469bb686e1211 before 736db11c86f03e717fc4bf771d05efdf10d23acb
affected

b6b26d86c61c441144c72f842f7469bb686e1211 before 8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec
affected

5e97dc748d13fad582136ba0c8cec215c7aeeb17
affected

63cd11165e5e0ea2012254c764003eda1f9adb7d
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

5.10.241
unaffected

5.15.190
unaffected

6.1.149
unaffected

6.6.103
unaffected

6.12.44
unaffected

6.16.4
unaffected

6.17
unaffected

References

git.kernel.org/...c/a732502bf3bbe859613b6d7b2b0313b11f0474ac

git.kernel.org/...c/0ad8509b468fa1058f4f400a1829f29e4ccc4de8

git.kernel.org/...c/9ff52d3af0ef286535749e14e3fe9eceb39a8349

git.kernel.org/...c/8f80c633cba144f721d38d9380f23d23ab7db10e

git.kernel.org/...c/4bdb0f78bddbfa77d3ab458a21dd9cec495d317a

git.kernel.org/...c/736db11c86f03e717fc4bf771d05efdf10d23acb

git.kernel.org/...c/8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec

cve.org (CVE-2025-38676)

nvd.nist.gov (CVE-2025-38676)

Download JSON