CVE-2025-39758
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's RDMA/siw component involves incorrect handling of the byte count in the siw_tcp_sendpages function. Specifically, the code was sending oversized iov_iter and tcp_sendmsg calls due to improperly set byte counts. While this was previously benign because sendpage_ok() always returned true, recent changes in the slab allocator disallowing sendpage on large kmalloc allocations have caused out-of-bounds crashes. The issue arises from differences in behavior between MSG_SPLICE_PAGES and regular copy paths, leading to potential memory corruption or crashes. The fix involves correctly setting the iov_iter's byte count and sending the correct byte count to tcp_sendmsg_locked.
How can this vulnerability impact me? :
This vulnerability can cause out-of-bounds memory access and crashes in the Linux kernel when using RDMA/siw functionality, potentially leading to system instability or denial of service. Since it involves kernel memory operations, it could affect the reliability and availability of systems relying on this component.