{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-39794","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T07:20:57.132Z","datePublished":"2025-09-12T15:59:31.226Z","dateUpdated":"2026-05-12T12:07:04.300Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:36:25.112Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nARM: tegra: Use I/O memcpy to write to IRAM\n\nKasan crashes the kernel trying to check boundaries when using the\nnormal memcpy."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/arm/mach-tegra/reset.c"],"versions":[{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"b28c1a14accc79ead1e87bbdae53309da60be1e7","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"75a3bdfeed2f129a2c7d9fd7779382b78e35b014","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"2499b0ac908eefbb8a217aae609b7a5b5174f330","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"387435f4833f97aabfd74434ee526e31e8a626ea","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"46b3a7a3a36d5833f14914d1b95c69d28c6a76d6","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"96d6605bf0561d6e568b1dd9265a0f73b5b94f51","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"30ef45b89a5961cdecf907ecff1ef3374d1de510","status":"affected","versionType":"git"},{"version":"b36ab9754efbd7429d214b3b03dc9843882571bd","lessThan":"398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/arm/mach-tegra/reset.c"],"versions":[{"version":"3.4","status":"affected"},{"version":"0","lessThan":"3.4","status":"unaffected","versionType":"semver"},{"version":"5.4.297","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.241","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.190","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.149","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.103","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.43","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.11","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.2","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"5.4.297"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"5.10.241"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"5.15.190"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"6.1.149"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"6.6.103"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"6.12.43"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"6.15.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"6.16.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4","versionEndExcluding":"6.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b28c1a14accc79ead1e87bbdae53309da60be1e7"},{"url":"https://git.kernel.org/stable/c/75a3bdfeed2f129a2c7d9fd7779382b78e35b014"},{"url":"https://git.kernel.org/stable/c/2499b0ac908eefbb8a217aae609b7a5b5174f330"},{"url":"https://git.kernel.org/stable/c/387435f4833f97aabfd74434ee526e31e8a626ea"},{"url":"https://git.kernel.org/stable/c/46b3a7a3a36d5833f14914d1b95c69d28c6a76d6"},{"url":"https://git.kernel.org/stable/c/9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87"},{"url":"https://git.kernel.org/stable/c/96d6605bf0561d6e568b1dd9265a0f73b5b94f51"},{"url":"https://git.kernel.org/stable/c/30ef45b89a5961cdecf907ecff1ef3374d1de510"},{"url":"https://git.kernel.org/stable/c/398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1"}],"title":"ARM: tegra: Use I/O memcpy to write to IRAM","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:43:26.094Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T12:07:04.300Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC CN 4100","versions":[{"status":"affected","version":"0","lessThan":"V5.0","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"}]}]}}