CVE-2025-39704
BaseFortify
Publication date: 2025-09-05
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow issue in the Linux kernel's KVM module for the LoongArch architecture. Specifically, the function send_ipi_data() calls kvm_io_bus_read() with a buffer parameter that should be at least 8 bytes. Some emulation functions write 8 bytes regardless of the buffer length, which can cause a buffer overflow when stack protection is enabled, potentially leading to kernel stack corruption and a kernel panic.
How can this vulnerability impact me? :
The vulnerability can cause a kernel panic due to stack corruption, which may lead to system crashes or instability. This could disrupt normal operations on affected systems running the Linux kernel with KVM on LoongArch architecture, potentially causing denial of service.