CVE-2025-39748
BaseFortify
Publication date: 2025-09-11
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's BPF verifier related to how it refines register value ranges after a JSET (jump if bits set) instruction. The verifier incorrectly handles an unreachable code path due to sign extension issues, leading to inconsistent bounds on a register. Instead of improving the complex range refinement for JSET, the fix was to forget the ranges when narrowing tnums after a JSET instruction to avoid the inconsistency.
How can this vulnerability impact me? :
The vulnerability causes the BPF verifier to walk through unreachable code paths and produce inconsistent register bounds, which could potentially lead to kernel warnings or instability when running certain BPF programs. However, since the problematic path is unreachable at runtime and LLVM does not generate JSET instructions, the practical impact is expected to be minimal.