CVE-2025-38676
iommu/amd: Avoid stack buffer overflow from kernel cmdline
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Aug 26, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
f2a5ec7f7b28f9b9cd5fac232ff51019a7f7b9e9 < a732502bf3bbe859613b6d7b2b0313b11f0474ac c513043e0afe6a8ba79d00af358655afabb576d2 < 0ad8509b468fa1058f4f400a1829f29e4ccc4de8 2ae19ac3ea82a5b87a81c10adbb497c9e58bdd60 < 9ff52d3af0ef286535749e14e3fe9eceb39a8349 b6b26d86c61c441144c72f842f7469bb686e1211 < 8f80c633cba144f721d38d9380f23d23ab7db10e b6b26d86c61c441144c72f842f7469bb686e1211 < 4bdb0f78bddbfa77d3ab458a21dd9cec495d317a b6b26d86c61c441144c72f842f7469bb686e1211 < 736db11c86f03e717fc4bf771d05efdf10d23acb b6b26d86c61c441144c72f842f7469bb686e1211 < 8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec 5e97dc748d13fad582136ba0c8cec215c7aeeb17 63cd11165e5e0ea2012254c764003eda1f9adb7d
Linux / Linux
6.3
References
git.kernel.org: https://git.kernel.org/stable/c/a732502bf3bbe859613b6d7b2b0313b11f0474ac git.kernel.org: https://git.kernel.org/stable/c/0ad8509b468fa1058f4f400a1829f29e4ccc4de8 git.kernel.org: https://git.kernel.org/stable/c/9ff52d3af0ef286535749e14e3fe9eceb39a8349 git.kernel.org: https://git.kernel.org/stable/c/8f80c633cba144f721d38d9380f23d23ab7db10e git.kernel.org: https://git.kernel.org/stable/c/4bdb0f78bddbfa77d3ab458a21dd9cec495d317a git.kernel.org: https://git.kernel.org/stable/c/736db11c86f03e717fc4bf771d05efdf10d23acb git.kernel.org: https://git.kernel.org/stable/c/8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html