CVE-2025-39904
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.16 (inc) to 6.16.8 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's kexec_buf structure, which was declared without proper initialization. A recent commit added a field that is always read but not consistently set by all architectures, causing the field to contain uninitialized (garbage) data. This leads to invalid memory access and triggers UBSAN warnings. The fix zero-initializes the kexec_buf structure at declaration to ensure all fields are cleanly set and prevent use of uninitialized memory.
How can this vulnerability impact me? :
The impact of this vulnerability is that uninitialized memory may be accessed, which can cause undefined behavior, potential crashes, or security issues related to invalid memory reads in the Linux kernel's kexec functionality. This could affect system stability or security on affected architectures like arm64 and riscv.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that zero-initializes the kexec_buf structure at declaration to ensure all fields are cleanly set, preventing uninitialized memory usage. This fix has been applied to arm64 and riscv architectures as described in the patch series "kexec: Fix invalid field access".