CVE-2025-39907
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to improper handling of DMA mappings in the NAND controller driver. Overlapping mappings can lead to errors in memory access, potentially affecting the reliability of NAND flash memory operations on affected hardware.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's mtd: rawnand: stm32_fmc2 driver involves overlapping memory mappings on the ECC (Error Correction Code) buffer. The issue arises because overlapping mappings are not supported and can cause errors during DMA (Direct Memory Access) operations. The fix involves using a contiguous non-cacheable buffer to avoid these overlapping mappings.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for specific kernel messages indicating overlapping mappings on the ECC buffer related to stm32_fmc2. Look for log entries similar to: '[ 4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST, overlapping mappings aren't supported' or warnings from add_dma_entry in kernel/dma/debug.c. You can use the command 'dmesg | grep stm32_fmc2_nfc' or 'journalctl -k | grep stm32_fmc2_nfc' to find these messages.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the issue is resolved by avoiding overlapping mappings on the ECC buffer in stm32_fmc2. The fix involves using a contiguous non-cacheable buffer to prevent overlapping mappings. Until the update is applied, monitor system logs for the described warnings and avoid workloads that trigger the overlapping mappings if possible.