CVE-2025-39839
BaseFortify
Publication date: 2025-09-19
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds (OOB) read and write issue in the Linux kernel's batman-adv module, specifically in the network-coding decode function batadv_nc_skb_decode_packet(). The function trusts a length value (coded_len) and only checks it against the destination buffer length (skb->len), but does not verify the source buffer length. This leads to reading and writing beyond the intended memory boundaries, which can cause memory corruption or crashes.
How can this vulnerability impact me? :
The out-of-bounds read and write can lead to memory corruption, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges on the affected system running the vulnerable Linux kernel module.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version where the batman-adv module has the fix applied that validates coded_len against the payload area of both destination and source sk_buffs before XORing. This prevents the out-of-bounds read and write. Until then, avoid using the affected batman-adv network-coding features if possible.