๐Ÿ” CVE Alert

CVE-2025-38391

UNKNOWN 0.0

usb: typec: altmodes/displayport: do not index invalid pin_assignments

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmodes/displayport: do not index invalid pin_assignments A poorly implemented DisplayPort Alt Mode port partner can indicate that its pin assignment capabilities are greater than the maximum value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show will cause a BRK exception due to an out of bounds array access. Prevent for loop in pin_assignment_show from accessing invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX value in typec_dp.h and using i < DP_PIN_ASSIGN_MAX as a loop condition.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < c93bc959788ed9a1af7df57cb539837bdf790cee 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < 114a977e0f6bf278e05eade055e13fc271f69cf7 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < 621d5a3ef0231ab242f2d31eecec40c38ca609c5 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < 2f535517b5611b7221ed478527e4b58e29536ddf 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < 45e9444b3b97eaf51a5024f1fea92f44f39b50c6 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < 5581e694d3a1c2f32c5a51d745c55b107644e1f8 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < 47cb5d26f61d80c805d7de4106451153779297a1 0e3bb7d6894d9b6e67d6382bb03a46a1dc989588 < af4db5a35a4ef7a68046883bfd12468007db38f1
Linux / Linux
4.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c93bc959788ed9a1af7df57cb539837bdf790cee git.kernel.org: https://git.kernel.org/stable/c/114a977e0f6bf278e05eade055e13fc271f69cf7 git.kernel.org: https://git.kernel.org/stable/c/621d5a3ef0231ab242f2d31eecec40c38ca609c5 git.kernel.org: https://git.kernel.org/stable/c/2f535517b5611b7221ed478527e4b58e29536ddf git.kernel.org: https://git.kernel.org/stable/c/45e9444b3b97eaf51a5024f1fea92f44f39b50c6 git.kernel.org: https://git.kernel.org/stable/c/5581e694d3a1c2f32c5a51d745c55b107644e1f8 git.kernel.org: https://git.kernel.org/stable/c/47cb5d26f61d80c805d7de4106451153779297a1 git.kernel.org: https://git.kernel.org/stable/c/af4db5a35a4ef7a68046883bfd12468007db38f1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html