CVE-2025-39715

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/09/2025
Last modified:
07/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> parisc: Revise gateway LWS calls to probe user read access<br /> <br /> We use load and stbys,e instructions to trigger memory reference<br /> interruptions without writing to memory. Because of the way read<br /> access support is implemented, read access interruptions are only<br /> triggered at privilege levels 2 and 3. The kernel and gateway<br /> page execute at privilege level 0, so this code never triggers<br /> a read access interruption. Thus, it is currently possible for<br /> user code to execute a LWS compare and swap operation at an<br /> address that is read protected at privilege level 3 (PRIV_USER).<br /> <br /> Fix this by probing read access rights at privilege level 3 and<br /> branching to lws_fault if access isn&amp;#39;t allowed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 6.1.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.44 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.16.4 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*