0.0
NA
CVE-2025-39794
ARM: tegra: Use I/O memcpy to write to IRAM
Description

In the Linux kernel, the following vulnerability has been resolved: ARM: tegra: Use I/O memcpy to write to IRAM Kasan crashes the kernel trying to check boundaries when using the normal memcpy.

INFO

Published Date :

Sept. 12, 2025, 4:15 p.m.

Last Modified :

Sept. 12, 2025, 4:15 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2025-39794 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Update the Linux kernel to apply the fix for memory corruption in Tegra IRAM.
  • Update the Linux kernel.
  • Apply the ARM tegra I/O memcpy fix.
  • Test the system for stability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-39794 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-39794 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-39794 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-39794 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Sep. 12, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ARM: tegra: Use I/O memcpy to write to IRAM Kasan crashes the kernel trying to check boundaries when using the normal memcpy.
    Added Reference https://git.kernel.org/stable/c/2499b0ac908eefbb8a217aae609b7a5b5174f330
    Added Reference https://git.kernel.org/stable/c/30ef45b89a5961cdecf907ecff1ef3374d1de510
    Added Reference https://git.kernel.org/stable/c/387435f4833f97aabfd74434ee526e31e8a626ea
    Added Reference https://git.kernel.org/stable/c/398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1
    Added Reference https://git.kernel.org/stable/c/46b3a7a3a36d5833f14914d1b95c69d28c6a76d6
    Added Reference https://git.kernel.org/stable/c/75a3bdfeed2f129a2c7d9fd7779382b78e35b014
    Added Reference https://git.kernel.org/stable/c/96d6605bf0561d6e568b1dd9265a0f73b5b94f51
    Added Reference https://git.kernel.org/stable/c/9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87
    Added Reference https://git.kernel.org/stable/c/b28c1a14accc79ead1e87bbdae53309da60be1e7
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.