๐Ÿ” CVE Alert

CVE-2025-39817

UNKNOWN 0.0

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare Observed on kernel 6.6 (present on master as well): BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0 Call trace: kasan_check_range+0xe8/0x190 __asan_loadN+0x1c/0x28 memcmp+0x98/0xd0 efivarfs_d_compare+0x68/0xd8 __d_lookup_rcu_op_compare+0x178/0x218 __d_lookup_rcu+0x1f8/0x228 d_alloc_parallel+0x150/0x648 lookup_open.isra.0+0x5f0/0x8d0 open_last_lookups+0x264/0x828 path_openat+0x130/0x3f8 do_filp_open+0x114/0x248 do_sys_openat2+0x340/0x3c0 __arm64_sys_openat+0x120/0x1a0 If dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become negative, leadings to oob. The issue can be triggered by parallel lookups using invalid filename: T1 T2 lookup_open ->lookup simple_lookup d_add // invalid dentry is added to hash list lookup_open d_alloc_parallel __d_lookup_rcu __d_lookup_rcu_op_compare hlist_bl_for_each_entry_rcu // invalid dentry can be retrieved ->d_compare efivarfs_d_compare // oob Fix it by checking 'guid' before cmp.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 16, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
da27a24383b2b10bf6ebd0db29b325548aafecb4 < 0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6 da27a24383b2b10bf6ebd0db29b325548aafecb4 < 794399019301944fd6d2e0d7a51b3327e26c410e da27a24383b2b10bf6ebd0db29b325548aafecb4 < 568e7761279b99c6daa3002290fd6d8047ddb6d2 da27a24383b2b10bf6ebd0db29b325548aafecb4 < d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7 da27a24383b2b10bf6ebd0db29b325548aafecb4 < 925599eba46045930b850a98ae594d2e3028ac40 da27a24383b2b10bf6ebd0db29b325548aafecb4 < c2925cd6207079c3f4d040d082515db78d63afbf da27a24383b2b10bf6ebd0db29b325548aafecb4 < 71581a82f38e5a4d807d71fc1bb59aead80ccf95 da27a24383b2b10bf6ebd0db29b325548aafecb4 < a6358f8cf64850f3f27857b8ed8c1b08cfc4685c 688289c4b745c018b3449b4b4c5a2030083c8eaf
Linux / Linux
3.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6 git.kernel.org: https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e git.kernel.org: https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2 git.kernel.org: https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7 git.kernel.org: https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40 git.kernel.org: https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf git.kernel.org: https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95 git.kernel.org: https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html