CVE-2025-39840
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
19/09/2025
Last modified:
12/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
audit: fix out-of-bounds read in audit_compare_dname_path()<br />
<br />
When a watch on dir=/ is combined with an fsnotify event for a<br />
single-character name directly under / (e.g., creating /a), an<br />
out-of-bounds read can occur in audit_compare_dname_path().<br />
<br />
The helper parent_len() returns 1 for "/". In audit_compare_dname_path(),<br />
when parentlen equals the full path length (1), the code sets p = path + 1<br />
and pathlen = 1 - 1 = 0. The subsequent loop then dereferences<br />
p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read.<br />
<br />
Fix this by adding a pathlen > 0 check to the while loop condition<br />
to prevent the out-of-bounds access.<br />
<br />
[PM: subject tweak, sign-off email fixes]
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.16.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



