CVE-2025-39794
Description
In the Linux kernel, the following vulnerability has been resolved:
ARM: tegra: Use I/O memcpy to write to IRAM
Kasan crashes the kernel trying to check boundaries when using the normal memcpy.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, ARM Tegra IRAM writes via normal memcpy cause KASAN a crash; fix uses I/O memcpy.
Vulnerability
Details
CVE-2025-39794 is a vulnerability in the Linux kernel affecting ARM Tegra platforms. The root cause is that the kernel used the standard memcpy function to write to Internal RAM (IRAM). The Kernel Address Sanitizer (KASAN) detects this as an invalid memory access because IRAM is not regular memory, causing a crash when KASAN checks memory access boundaries [1].
Exploitation
To trigger the vulnerability, an attacker would need to be able to trigger a write to IRAM on an affected ARM Tegra system with KASAN enabled. The write itself is a legitimate kernel operation, but the use of the wrong memcpy variant causes a crash. No special privileges are required beyond the ability to initiate such a write, which may be possible from user space or through kernel drivers [2].
Impact
If triggered, this vulnerability leads to a kernel crash (denial of service). The CVSS v3 base score is 5.5 (Medium), with the main impact being availability [1]. There is no indication of privilege escalation or information disclosure.
Mitigation
The fix is to replace the normal memcpy with an I/O memory copy function (such as memcpy_toio) that correctly handles accesses to IRAM. Patches have been submitted to the Linux kernel stable trees [3][4]. Users should update to a kernel version containing the fix. The affected product SIMATIC CN 4100 is also listed as affected and requires a firmware update [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Linux/Linuxv5Range: 3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- git.kernel.org/stable/c/2499b0ac908eefbb8a217aae609b7a5b5174f330nvdPatch
- git.kernel.org/stable/c/30ef45b89a5961cdecf907ecff1ef3374d1de510nvdPatch
- git.kernel.org/stable/c/387435f4833f97aabfd74434ee526e31e8a626eanvdPatch
- git.kernel.org/stable/c/398e67e0f5ae04b29bcc9cbf342e339fe9d3f6f1nvdPatch
- git.kernel.org/stable/c/46b3a7a3a36d5833f14914d1b95c69d28c6a76d6nvdPatch
- git.kernel.org/stable/c/75a3bdfeed2f129a2c7d9fd7779382b78e35b014nvdPatch
- git.kernel.org/stable/c/96d6605bf0561d6e568b1dd9265a0f73b5b94f51nvdPatch
- git.kernel.org/stable/c/9b0b3b5e5cae95e09bf0ae4a9bcb58d9b6d57f87nvdPatch
- git.kernel.org/stable/c/b28c1a14accc79ead1e87bbdae53309da60be1e7nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00007.htmlnvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories