๐Ÿ” CVE Alert

CVE-2025-39839

UNKNOWN 0.0

batman-adv: fix OOB read/write in network-coding decode

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix OOB read/write in network-coding decode batadv_nc_skb_decode_packet() trusts coded_len and checks only against skb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing payload headroom, and the source skb length is not verified, allowing an out-of-bounds read and a small out-of-bounds write. Validate that coded_len fits within the payload area of both destination and source sk_buffs before XORing.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 19, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2df5278b0267c799f3e877e8eeddbb6e93cda0bb < 30fc47248f02b8a14a61df469e1da4704be1a19f 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < 1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < 5d334bce9fad58cf328d8fa14ea1fff855819863 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < dce6c2aa70e94c04c523b375dfcc664d7a0a560a 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < bb37252c9af1cb250f34735ee98f80b46be3cef1 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < 20080709457bc1e920eb002483d7d981d9b2ac1c 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < a67c6397fcb7e842d3c595243049940970541c48 2df5278b0267c799f3e877e8eeddbb6e93cda0bb < d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087
Linux / Linux
3.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f git.kernel.org: https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183 git.kernel.org: https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863 git.kernel.org: https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a git.kernel.org: https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1 git.kernel.org: https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c git.kernel.org: https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48 git.kernel.org: https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-089022.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html