| Release Date: | 2025-09-16 | |
| Impact: | Moderate | What is this? | 
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare Observed on kernel 6.6 (present on master as well): BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0 Call trace: kasan_check_range+0xe8/0x190 __asan_loadN+0x1c/0x28 memcmp+0x98/0xd0 efivarfs_d_compare+0x68/0xd8 __d_lookup_rcu_op_compare+0x178/0x218 __d_lookup_rcu+0x1f8/0x228 d_alloc_parallel+0x150/0x648 lookup_open.isra.0+0x5f0/0x8d0 open_last_lookups+0x264/0x828 path_openat+0x130/0x3f8 do_filp_open+0x114/0x248 do_sys_openat2+0x340/0x3c0 __arm64_sys_openat+0x120/0x1a0 If dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become negative, leadings to oob. The issue can be triggered by parallel lookups using invalid filename: T1 T2 lookup_open ->lookup simple_lookup d_add // invalid dentry is added to hash list lookup_open d_alloc_parallel __d_lookup_rcu __d_lookup_rcu_op_compare hlist_bl_for_each_entry_rcu // invalid dentry can be retrieved ->d_compare efivarfs_d_compare // oob Fix it by checking 'guid' before cmp.
See more information about CVE-2025-39817 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 7.0 | 
| Vector String: | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | 
| Version: | 3.1 | 
| Attack Vector: | Local | 
| Attack Complexity: | High | 
| Privileges Required: | Low | 
| User Interaction: | None | 
| Scope: | Unchanged | 
| Confidentiality Impact: | High | 
| Integrity Impact: | High | 
| Availability Impact: | High | 
| Platform | Errata | Release Date | 
| Oracle Linux version 10 (kernel) | ELSA-2025-18318 | 2025-10-20 | 
| Oracle Linux version 7 (kernel-uek) | ELSA-2025-20663 | 2025-10-11 | 
| Oracle Linux version 8 (kernel) | ELSA-2025-19102 | 2025-10-27 | 
| Oracle Linux version 8 (kernel-uek) | ELSA-2025-20663 | 2025-10-11 | 
| Oracle Linux version 9 (kernel) | ELSA-2025-18281 | 2025-10-20 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: