CVE-2025-39689
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
| linux | linux_kernel | 5.10.244-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the handling of filter files in the ftrace subsystem. Specifically, when reading the set_ftrace_filter and set_ftrace_notrace files, the reader uses a pointer to a global tracer hash without making a copy. Since this pointer remains static across function calls that release locks allowing updates to the global tracer hashes, it can lead to use-after-free (UAF) and similar bugs. The fix involves allocating and copying the hash for reading filter files, similar to how writers handle it, preventing UAF issues and simplifying the code.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free bugs in the Linux kernel's ftrace subsystem, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the improper handling of filter hashes.