Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-38676

Опубликовано: 03 сент. 2025
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

iommu/amd: Avoid stack buffer overflow from kernel cmdline

EPSS

Процентиль: 38%
0.00169
Низкий

7.8 High

CVSS3

Связанные уязвимости

ubuntu
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.

CVSS3: 6
redhat
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.

nvd
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.

debian
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: i ...

github
3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Avoid stack buffer overflow from kernel cmdline While the kernel command line is considered trusted in most environments, avoid writing 1 byte past the end of "acpiid" if the "str" argument is maximum length.

EPSS

Процентиль: 38%
0.00169
Низкий

7.8 High

CVSS3