CVE-2025-39684
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a kernel information leak in the Linux kernel's comedi subsystem. It occurs because certain instruction handlers in the do_insn_ioctl() and do_insnlist_ioctl() functions do not fully initialize the memory buffer before copying data back to user-space. Specifically, when handling instructions that request multiple samples, some handlers only fill part of the buffer, leaving uninitialized kernel memory exposed to user-space. This can leak sensitive kernel data. The issue was fixed by ensuring that uninitialized parts of the buffer are zeroed before use.
How can this vulnerability impact me? :
This vulnerability can lead to an information leak where uninitialized kernel memory is exposed to user-space applications. An attacker or malicious user-space program could potentially read sensitive kernel data, which may include confidential information or internal kernel state, leading to privacy and security risks.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by ensuring that uninitialized parts of the allocated kernel buffer are zeroed before handling each instruction in the affected functions. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for CVE-2025-39684, which replaces the use of kmalloc_array() with kcalloc() in do_insn_ioctl() and do_insnlist_ioctl().