CVE-2025-39817
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.6 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds memory access in the Linux kernel's efivarfs component, specifically in the efivarfs_d_compare function. It occurs when the length of a dentry name is less than the expected EFI variable GUID length, causing a 'guid' value to become negative and leading to out-of-bounds memory access. This can be triggered by parallel lookups using invalid filenames, which add invalid dentries to the hash list and cause the vulnerable function to access memory incorrectly. The issue was fixed by adding a check on the 'guid' value before comparison.
How can this vulnerability impact me? :
This vulnerability can lead to out-of-bounds memory access in the Linux kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the memory corruption.