CVE-2025-38425Improper Handling of Length Parameter Inconsistency in Linux

Severity
7.8HIGHNVD
OSV5.6OSV3.2
EPSS
0.0%
top 93.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 25
Latest updateMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: check msg length in SMBUS block read For SMBUS block read, do not continue to read if the message length passed from the device is '0' or greater than the maximum allowed bytes.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.26.6.95+3
Debianlinux/linux_kernel< 6.1.147-1+2
Ubuntulinux/linux_kernel< 6.8.0-100.100
CVEListV5linux/linuxd7583c8a57485da19feb6dd85573763a8c5ec1d1c39d1a9ae4ad66afcecab124d7789722bfe909fa+5

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

23
OSV
linux-azure-6.8 vulnerabilities2026-03-25
OSV
linux-azure-fips vulnerabilities2026-03-04
OSV
linux-azure vulnerabilities2026-03-04
OSV
linux-ibm, linux-ibm-6.8 vulnerabilities2026-02-24
OSV
linux-xilinx vulnerabilities2026-02-24

📋Vendor Advisories

21
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Xilinx) vulnerabilities2026-02-24
Ubuntu
Linux kernel (IBM) vulnerabilities2026-02-24
CVE-2025-38425 — Linux vulnerability | cvebase