CVE-2025-39917
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-12-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.10 (inc) to 6.12.48 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.16.8 (exc) |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | 6.17 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds (OOB) write issue in the Linux kernel's bpf_crypto_crypt function. It occurs because the size of the destination dynamic pointer (dynptr) is not checked to ensure it is at least as large as the source dynptr before performing a write operation. If the destination is smaller than the source, writing data can overflow the destination buffer, potentially corrupting memory.
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption due to out-of-bounds writes when the destination buffer is smaller than the source buffer during cryptographic operations in the kernel. Since these functions are accessible only with root privileges, exploitation could allow an attacker with root access to cause system instability, crashes, or potentially execute arbitrary code within the kernel context.
What immediate steps should I take to mitigate this vulnerability?
Since the vulnerability involves an out-of-bounds write in the Linux kernel's bpf_crypto_crypt function, which is accessible only under root privileges, immediate mitigation steps include updating the Linux kernel to a version where this issue is fixed. Avoid running untrusted BPF programs with root privileges until the patch is applied.