๐Ÿ” CVE Alert

CVE-2025-39716

UNKNOWN 0.0

parisc: Revise __get_user() to probe user read access

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: parisc: Revise __get_user() to probe user read access Because of the way read access support is implemented, read access interruptions are only triggered at privilege levels 2 and 3. The kernel executes at privilege level 0, so __get_user() never triggers a read access interruption (code 26). Thus, it is currently possible for user code to access a read protected address via a system call. Fix this by probing read access rights at privilege level 3 (PRIV_USER) and setting __gu_err to -EFAULT (-14) if access isn't allowed. Note the cmpiclr instruction does a 32-bit compare because COND macro doesn't work inside asm.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 5, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 28a9b71671fb4a2993ef85b8ef6f117ea63894fe 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4c981077255acc2ed5b3df6e8dd0125c81b626a9 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f410ef9a032caf98117256b22139c31342d7bb06 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 741b163e440683195b8fd4fc8495fcd0105c6ab7 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 89f686a0fb6e473a876a9a60a13aec67a62b9a7e
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/28a9b71671fb4a2993ef85b8ef6f117ea63894fe git.kernel.org: https://git.kernel.org/stable/c/4c981077255acc2ed5b3df6e8dd0125c81b626a9 git.kernel.org: https://git.kernel.org/stable/c/f410ef9a032caf98117256b22139c31342d7bb06 git.kernel.org: https://git.kernel.org/stable/c/741b163e440683195b8fd4fc8495fcd0105c6ab7 git.kernel.org: https://git.kernel.org/stable/c/89f686a0fb6e473a876a9a60a13aec67a62b9a7e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html