๐Ÿ” CVE Alert

CVE-2025-38336

UNKNOWN 0.0

ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 The controller has a hardware bug that can hard hang the system when doing ATAPI DMAs without any trace of what happened. Depending on the device attached, it can also prevent the system from booting. In this case, the system hangs when reading the ATIP from optical media with cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an Optiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4, running at UDMA/33. The issue can be reproduced by running the same command with a cygwin build of cdrecord on WinXP, although it requires more attempts to cause it. The hang in that case is also resolved by forcing PIO. It doesn't appear that VIA has produced any drivers for that OS, thus no known workaround exists. HDDs attached to the controller do not suffer from any DMA issues.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5955c7a2cfb6a35429adea5dc480002b15ca8cfc < 67d66a5e4583fd3bcf13d6f747e571df13cbad51 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < 0d9a48dfa934f43ac839211ae4aeba34f666a9a5 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < 7fc89c218fc96a296a2840b1e37f4e0975f7a108 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < 8212cd92fe40aae6fe5a073bc70e758c42bb4bfc 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < 8edfed4439b107d62151ff6c075958d169da3e71 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < 947f9304d3c876c6672b947b80c0ef51161c6d2f 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < bb7212ee4ff086628a2c1c22336d082a87cb893d 5955c7a2cfb6a35429adea5dc480002b15ca8cfc < d29fc02caad7f94b62d56ee1b01c954f9c961ba7 466909ba06d0bfd5423cd5ca9bea22e43384377e 95cfc84fd09cb77669da9ae6e9ad5ced027ca483
Linux / Linux
2.6.29

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/67d66a5e4583fd3bcf13d6f747e571df13cbad51 git.kernel.org: https://git.kernel.org/stable/c/0d9a48dfa934f43ac839211ae4aeba34f666a9a5 git.kernel.org: https://git.kernel.org/stable/c/7fc89c218fc96a296a2840b1e37f4e0975f7a108 git.kernel.org: https://git.kernel.org/stable/c/8212cd92fe40aae6fe5a073bc70e758c42bb4bfc git.kernel.org: https://git.kernel.org/stable/c/8edfed4439b107d62151ff6c075958d169da3e71 git.kernel.org: https://git.kernel.org/stable/c/947f9304d3c876c6672b947b80c0ef51161c6d2f git.kernel.org: https://git.kernel.org/stable/c/bb7212ee4ff086628a2c1c22336d082a87cb893d git.kernel.org: https://git.kernel.org/stable/c/d29fc02caad7f94b62d56ee1b01c954f9c961ba7 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html