CVE-2025-39790
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's MHI bus host driver when processing completion events from a remote device. The device sends a pointer to a consumed Transfer Ring Element (TRE), which the host uses to process TREs between its current read pointer and the pointer received. If the device sends an event for a single-element transaction but the pointer is multiple elements ahead, the host may incorrectly treat it as a chained transaction and process multiple TREs. This can lead to the host accessing stale data and potentially double-freeing buffers, causing instability or crashes. The issue arises because the device updates the event ring pointer before updating the event contents, creating a window where the host reads outdated pointers.
How can this vulnerability impact me? :
This vulnerability can cause the host system to double-free memory buffers due to processing stale or incorrect pointers from the device. This can lead to system instability, crashes, or potential denial of service conditions if exploited or triggered unintentionally.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for this vulnerability, specifically the commit that ensures the host treats transactions where the event points to a TRE that isn't local_rp + 1 as chained. This hardening prevents double-free conditions caused by stale event pointers.