CVE-2025-39839
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
19/09/2025
Last modified:
20/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
batman-adv: fix OOB read/write in network-coding decode<br />
<br />
batadv_nc_skb_decode_packet() trusts coded_len and checks only against<br />
skb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing<br />
payload headroom, and the source skb length is not verified, allowing an<br />
out-of-bounds read and a small out-of-bounds write.<br />
<br />
Validate that coded_len fits within the payload area of both destination<br />
and source sk_buffs before XORing.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.10 (including) | 5.4.299 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.243 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.192 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.151 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.105 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183
- https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c
- https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f
- https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863
- https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48
- https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1
- https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087
- https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



