CVE-2025-39998
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-29
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow in the Linux kernel's SCSI target subsystem, specifically in the target_core_configfs component. It occurs because the function target_lu_gp_members_show uses snprintf to write multiple strings into a fixed-size buffer of 256 bytes without properly checking if the total formatted string length exceeds the buffer size. If the formatted string is longer than 256 bytes, memcpy is called with a length that exceeds the buffer size, causing a buffer overflow error. The issue can be prevented by adding a length check on the return value of snprintf.
How can this vulnerability impact me? :
This buffer overflow vulnerability can potentially lead to memory corruption in the Linux kernel, which may cause system instability, crashes, or could be exploited by an attacker to execute arbitrary code with kernel privileges, leading to a full system compromise.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Linux kernel to a version where the buffer overflow in target_core_configfs (specifically in the target_lu_gp_members_show function) has been fixed by adding a length check after snprintf. This prevents the buffer overflow by ensuring the formatted string does not exceed the allocated buffer size.