CVE-2025-39958
BaseFortify
Publication date: 2025-10-09
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's s390 iommu subsystem when a PCI device is surprise removed (hotplugged out unexpectedly). Attempts to attach the removed device to the default domain fail because the device handle becomes invalid as the hypervisor no longer recognizes the device. This failure triggers warnings and errors in the kernel. The fix makes the attach operation succeed even if the device is removed or in an error state, allowing the system to handle the hotplug event cleanly without errors.
How can this vulnerability impact me? :
If unpatched, this vulnerability can cause errors and warnings in the kernel when a PCI device is surprise removed, potentially leading to instability or improper handling of device removal events. However, with the fix, the system proceeds as if the registration was successful, preventing such errors and ensuring proper cleanup. The impact is mainly on system stability and correct device hotplug handling on s390 platforms.