CVE-2025-39674
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's UFS Qualcomm driver related to the Enhanced System Interrupt (ESI) feature. It occurs when the system tries to allocate MSI (Message Signaled Interrupts) resources but fails, and the cleanup code incorrectly attempts to free resources that were never allocated, leading to a kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a null pointer dereference, potentially leading to system instability or denial of service on affected devices using the UFS Qualcomm driver with ESI enabled.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that restructures the ESI configuration to try MSI allocation first before any other resource allocation and replaces the __free() macro with explicit cleanup to avoid freeing unallocated resources. This fix prevents the null pointer dereference in the ufs-qcom driver. Ensure your Linux kernel is updated to include this fix.