CVE-2025-39795
BaseFortify
Publication date: 2025-09-12
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a potential overflow in the blk_stack_limits() function when checking the chunk_sectors value. The function checks if chunk_sectors is a multiple of physical_block_size, but calculating chunk_sectors in bytes can cause an overflow of the unsigned int variable holding it. The fix changes the check to be based on sectors to avoid this overflow.
How can this vulnerability impact me? :
If exploited, this overflow could lead to incorrect validation of block device parameters, potentially causing unexpected behavior or system instability in the Linux kernel's block layer. This might affect data integrity or system reliability.