CVE-2025-39794
ARM: tegra: Use I/O memcpy to write to IRAM
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: tegra: Use I/O memcpy to write to IRAM Kasan crashes the kernel trying to check boundaries when using the normal memcpy.
INFO
Published Date :
Sept. 12, 2025, 4:15 p.m.
Last Modified :
Sept. 12, 2025, 4:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products
The following products are affected by CVE-2025-39794
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
Solution
- Update the Linux kernel.
- Apply the ARM tegra I/O memcpy fix.
- Test the system for stability.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-39794
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-39794
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-39794
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-39794
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-39794
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 12, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: ARM: tegra: Use I/O memcpy to write to IRAM Kasan crashes the kernel trying to check boundaries when using the normal memcpy. Added Reference https://git.kernel.org/stable/c/2499b0ac908eefbb8a217aae609b7a5b5174f330 Added Reference https://git.kernel.org/stable/c/30ef45b89a5961cdecf907ecff1ef3374d1de510 Added Reference https://git.kernel.org/stable/c/387435f4833f97aabfd74434ee526e31e8a626ea Added Reference https://git.kernel.org/stable/c/398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1 Added Reference https://git.kernel.org/stable/c/46b3a7a3a36d5833f14914d1b95c69d28c6a76d6 Added Reference https://git.kernel.org/stable/c/75a3bdfeed2f129a2c7d9fd7779382b78e35b014 Added Reference https://git.kernel.org/stable/c/96d6605bf0561d6e568b1dd9265a0f73b5b94f51 Added Reference https://git.kernel.org/stable/c/9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87 Added Reference https://git.kernel.org/stable/c/b28c1a14accc79ead1e87bbdae53309da60be1e7