lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025091223-CVE-2025-39794-9d67@gregkh>
Date: Fri, 12 Sep 2025 17:59:24 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-39794: ARM: tegra: Use I/O memcpy to write to IRAM

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

ARM: tegra: Use I/O memcpy to write to IRAM

Kasan crashes the kernel trying to check boundaries when using the
normal memcpy.

The Linux kernel CVE team has assigned CVE-2025-39794 to this issue.


Affected and fixed versions
===========================

	Fixed in 5.4.297 with commit b28c1a14accc79ead1e87bbdae53309da60be1e7
	Fixed in 5.10.241 with commit 75a3bdfeed2f129a2c7d9fd7779382b78e35b014
	Fixed in 5.15.190 with commit 2499b0ac908eefbb8a217aae609b7a5b5174f330
	Fixed in 6.1.149 with commit 387435f4833f97aabfd74434ee526e31e8a626ea
	Fixed in 6.6.103 with commit 46b3a7a3a36d5833f14914d1b95c69d28c6a76d6
	Fixed in 6.12.43 with commit 9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87
	Fixed in 6.15.11 with commit 96d6605bf0561d6e568b1dd9265a0f73b5b94f51
	Fixed in 6.16.2 with commit 30ef45b89a5961cdecf907ecff1ef3374d1de510
	Fixed in 6.17-rc1 with commit 398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-39794
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	arch/arm/mach-tegra/reset.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/b28c1a14accc79ead1e87bbdae53309da60be1e7
	https://git.kernel.org/stable/c/75a3bdfeed2f129a2c7d9fd7779382b78e35b014
	https://git.kernel.org/stable/c/2499b0ac908eefbb8a217aae609b7a5b5174f330
	https://git.kernel.org/stable/c/387435f4833f97aabfd74434ee526e31e8a626ea
	https://git.kernel.org/stable/c/46b3a7a3a36d5833f14914d1b95c69d28c6a76d6
	https://git.kernel.org/stable/c/9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87
	https://git.kernel.org/stable/c/96d6605bf0561d6e568b1dd9265a0f73b5b94f51
	https://git.kernel.org/stable/c/30ef45b89a5961cdecf907ecff1ef3374d1de510
	https://git.kernel.org/stable/c/398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ