CVE-2025-38380
i2c/designware: Fix an initialization issue
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
July 25, 2025, 1:15 p.m.
Last Modified :
Sept. 17, 2025, 2:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Ensure msg_write_idx is initialized.
- Review i2c_dw_xfer_init() initialization logic.
- Update the Linux kernel.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-38380 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-38380 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 17, 2025
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 17, 2025
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init(). Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed Reference kernel.org: https://git.kernel.org/stable/c/3d30048958e0d43425f6d4e76565e6249fa71050 Removed Reference kernel.org: https://git.kernel.org/stable/c/475f89e1f9bde45fc948589e7cde1f5d899ae412 Removed Reference kernel.org: https://git.kernel.org/stable/c/4c37963d67fb945a59faf53bebe048ca201e44df Removed Reference kernel.org: https://git.kernel.org/stable/c/5b622e672e49e50c33fc64cd06b05ce76e1de460 Removed Reference kernel.org: https://git.kernel.org/stable/c/6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149 Removed Reference kernel.org: https://git.kernel.org/stable/c/9b5b600e751fae92ba571b015eaf02c9c58e2083 -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jul. 25, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: i2c/designware: Fix an initialization issue The i2c_dw_xfer_init() function requires msgs and msg_write_idx from the dev context to be initialized. amd_i2c_dw_xfer_quirk() inits msgs and msgs_num, but not msg_write_idx. This could allow an out of bounds access (of msgs). Initialize msg_write_idx before calling i2c_dw_xfer_init(). Added Reference https://git.kernel.org/stable/c/3d30048958e0d43425f6d4e76565e6249fa71050 Added Reference https://git.kernel.org/stable/c/475f89e1f9bde45fc948589e7cde1f5d899ae412 Added Reference https://git.kernel.org/stable/c/4c37963d67fb945a59faf53bebe048ca201e44df Added Reference https://git.kernel.org/stable/c/5b622e672e49e50c33fc64cd06b05ce76e1de460 Added Reference https://git.kernel.org/stable/c/6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149 Added Reference https://git.kernel.org/stable/c/9b5b600e751fae92ba571b015eaf02c9c58e2083