CVE-2025-39904
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
14/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
arm64: kexec: initialize kexec_buf struct in load_other_segments()<br />
<br />
Patch series "kexec: Fix invalid field access".<br />
<br />
The kexec_buf structure was previously declared without initialization. <br />
commit bf454ec31add ("kexec_file: allow to place kexec_buf randomly")<br />
added a field that is always read but not consistently populated by all<br />
architectures. This un-initialized field will contain garbage.<br />
<br />
This is also triggering a UBSAN warning when the uninitialized data was<br />
accessed:<br />
<br />
------------[ cut here ]------------<br />
UBSAN: invalid-load in ./include/linux/kexec.h:210:10<br />
load of value 252 is not a valid value for type &#39;_Bool&#39;<br />
<br />
Zero-initializing kexec_buf at declaration ensures all fields are cleanly<br />
set, preventing future instances of uninitialized memory being used.<br />
<br />
An initial fix was already landed for arm64[0], and this patchset fixes<br />
the problem on the remaining arm64 code and on riscv, as raised by Mark.<br />
<br />
Discussions about this problem could be found at[1][2].<br />
<br />
<br />
This patch (of 3):<br />
<br />
The kexec_buf structure was previously declared without initialization.<br />
commit bf454ec31add ("kexec_file: allow to place kexec_buf randomly")<br />
added a field that is always read but not consistently populated by all<br />
architectures. This un-initialized field will contain garbage.<br />
<br />
This is also triggering a UBSAN warning when the uninitialized data was<br />
accessed:<br />
<br />
------------[ cut here ]------------<br />
UBSAN: invalid-load in ./include/linux/kexec.h:210:10<br />
load of value 252 is not a valid value for type &#39;_Bool&#39;<br />
<br />
Zero-initializing kexec_buf at declaration ensures all fields are<br />
cleanly set, preventing future instances of uninitialized memory being<br />
used.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (incluyendo) | 6.16.8 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



