CVE-2025-39901
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.12 (inc) to 6.12.46 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.16.6 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the i40e driver in the Linux kernel, specifically its debugfs files 'command' and 'netdev_ops'. These files use a static 256-byte buffer that is shared across devices and implemented with questionable logic. The 'netdev_ops' file can be exploited by carefully crafted input to cause an overflow in snprintf, potentially allowing reading of arbitrary kernel memory. The vulnerability arises because the read functions use this static buffer without proper locking, and the buffer can be accessed simultaneously, leading to possible memory exposure. The fix was to remove read access to these debugfs files and refactor the write function to avoid using the static buffer, preventing overflow and simultaneous write issues.
How can this vulnerability impact me? :
This vulnerability can impact you by potentially allowing an attacker to read arbitrary kernel memory through the 'netdev_ops' debugfs file if they craft specific input. This could lead to exposure of sensitive kernel data or system information. However, the 'command' file is not exploitable in this way. The overall impact is limited to information disclosure via a legacy debug interface, which has been mitigated by removing read access to these files.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is mitigated by removing read access to the 'command' and 'netdev_ops' debugfs files in the i40e driver. Immediate steps include updating the Linux kernel to a version where this fix is applied, which disables read access to these debugfs files, preventing potential arbitrary kernel memory reads. Additionally, avoid using these debugfs interfaces as they are legacy and mostly useless, and rely on more standard interfaces to obtain netdev information.