In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Avoid stack buffer overflow from kernel cmdline
While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.
iommu/amd: Avoid stack buffer overflow from kernel cmdline
While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.
Metrics
Affected Vendors & Products
References
History
Thu, 28 Aug 2025 15:00:00 +0000
Thu, 28 Aug 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-805 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 27 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Tue, 26 Aug 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length. | |
Title | iommu/amd: Avoid stack buffer overflow from kernel cmdline | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-08-28T14:44:38.648Z
Reserved: 2025-04-16T04:51:24.031Z
Link: CVE-2025-38676

No data.

Status : Awaiting Analysis
Published: 2025-08-26T13:15:32.147
Modified: 2025-08-28T15:15:58.427
Link: CVE-2025-38676


Updated: 2025-08-27T11:21:38Z