In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Avoid stack buffer overflow from kernel cmdline
While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Thu, 28 Aug 2025 15:00:00 +0000
Thu, 28 Aug 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-805 | |
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        cvssV3_1
         
 
  | 
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Linux
         Linux linux Kernel  | 
|
| Vendors & Products | 
        
        Linux
         Linux linux Kernel  | 
Tue, 26 Aug 2025 13:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length. | |
| Title | iommu/amd: Avoid stack buffer overflow from kernel cmdline | |
| References | 
         | 
Status: PUBLISHED
Assigner: Linux
Published: 2025-08-26T13:07:48.761Z
Updated: 2025-11-03T17:40:59.770Z
Reserved: 2025-04-16T04:51:24.031Z
Link: CVE-2025-38676
No data.
Status : Awaiting Analysis
Published: 2025-08-26T13:15:32.147
Modified: 2025-11-03T18:16:34.147
Link: CVE-2025-38676