CVE-2025-39822
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.12 (inc) to 6.16.5 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a signedness error in the Linux kernel's io_uring subsystem. Specifically, when importing and using buffers, the buffer length (buf->len) is treated as unsigned, but during processing, it is converted to a signed integer. If the buffer length is large enough, this conversion can cause it to be interpreted as a negative value, leading to unexpected behavior. The fix involves making the calculation unsigned to prevent this issue.
How can this vulnerability impact me? :
The vulnerability can cause unexpected behavior in the Linux kernel when handling large buffers due to incorrect signedness conversion. This may lead to potential instability, incorrect processing of data, or security issues related to buffer handling in systems using io_uring.