U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38336 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 The controller has a hardware bug that can hard hang the system when doing ATAPI DMAs without any trace of what happened. Depending on the device attached, it can also prevent the system from booting. In this case, the system hangs when reading the ATIP from optical media with cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an Optiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4, running at UDMA/33. The issue can be reproduced by running the same command with a cygwin build of cdrecord on WinXP, although it requires more attempts to cause it. The hang in that case is also resolved by forcing PIO. It doesn't appear that VIA has produced any drivers for that OS, thus no known workaround exists. HDDs attached to the controller do not suffer from any DMA issues.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0d9a48dfa934f43ac839211ae4aeba34f666a9a5 kernel.org
https://git.kernel.org/stable/c/67d66a5e4583fd3bcf13d6f747e571df13cbad51 kernel.org
https://git.kernel.org/stable/c/7fc89c218fc96a296a2840b1e37f4e0975f7a108 kernel.org
https://git.kernel.org/stable/c/8212cd92fe40aae6fe5a073bc70e758c42bb4bfc kernel.org
https://git.kernel.org/stable/c/8edfed4439b107d62151ff6c075958d169da3e71 kernel.org
https://git.kernel.org/stable/c/947f9304d3c876c6672b947b80c0ef51161c6d2f kernel.org
https://git.kernel.org/stable/c/bb7212ee4ff086628a2c1c22336d082a87cb893d kernel.org
https://git.kernel.org/stable/c/d29fc02caad7f94b62d56ee1b01c954f9c961ba7 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38336
NVD Published Date:
07/10/2025
NVD Last Modified:
07/10/2025
Source:
kernel.org