CVE-2025-39716

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/09/2025
Last modified:
07/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> parisc: Revise __get_user() to probe user read access<br /> <br /> Because of the way read access support is implemented, read access<br /> interruptions are only triggered at privilege levels 2 and 3. The<br /> kernel executes at privilege level 0, so __get_user() never triggers<br /> a read access interruption (code 26). Thus, it is currently possible<br /> for user code to access a read protected address via a system call.<br /> <br /> Fix this by probing read access rights at privilege level 3 (PRIV_USER)<br /> and setting __gu_err to -EFAULT (-14) if access isn&amp;#39;t allowed.<br /> <br /> Note the cmpiclr instruction does a 32-bit compare because COND macro<br /> doesn&amp;#39;t work inside asm.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.13 (including) 6.1.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.44 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.16.4 (excluding)
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*