CVE-2025-39716
📋 TL;DR
This CVE-2025-39716 is a privilege escalation vulnerability in the Linux kernel's parisc architecture implementation. It allows user-space programs to bypass memory read protection by exploiting a flaw in the __get_user() function, which fails to properly validate read access rights at the correct privilege level. Systems running Linux kernels with parisc architecture support are affected.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
An attacker could read kernel memory or protected user-space memory, potentially leading to information disclosure, privilege escalation, or bypassing security boundaries.
Likely Case
Information disclosure from kernel or protected memory regions, potentially exposing sensitive data or system information.
If Mitigated
With proper access controls and kernel hardening, impact is limited to potential information disclosure from accessible memory regions.
🎯 Exploit Status
Exploitation requires local access and knowledge of parisc architecture specifics. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 28a9b71671fb4a2993ef85b8ef6f117ea63894fe, 4c981077255acc2ed5b3df6e8dd0125c81b626a9, 741b163e440683195b8fd4fc8495fcd0105c6ab7, 89f686a0fb6e473a876a9a60a13aec67a62b9a7e, f410ef9a032caf98117256b22139c31342d7bb06
Vendor Advisory: https://git.kernel.org/stable/c/28a9b71671fb4a2993ef85b8ef6f117ea63894fe
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Restrict local user access
allLimit access to systems with parisc architecture to trusted users only
🧯 If You Can't Patch
- Implement strict access controls to limit local user privileges
- Monitor systems for unusual memory access patterns or privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check kernel version and architecture: uname -a | grep -i parisc && check if kernel version predates fix commits
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits: grep -r '28a9b71671fb4a2993ef85b8ef6f117ea63894fe' /boot/System.map* or check kernel source
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages related to memory access violations
- System call failures with EFAULT errors from user-space programs
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
source="kernel" AND ("segmentation fault" OR "page fault" OR "EFAULT") AND process="system_call"
🔗 References
- https://git.kernel.org/stable/c/28a9b71671fb4a2993ef85b8ef6f117ea63894fe
- https://git.kernel.org/stable/c/4c981077255acc2ed5b3df6e8dd0125c81b626a9
- https://git.kernel.org/stable/c/741b163e440683195b8fd4fc8495fcd0105c6ab7
- https://git.kernel.org/stable/c/89f686a0fb6e473a876a9a60a13aec67a62b9a7e
- https://git.kernel.org/stable/c/f410ef9a032caf98117256b22139c31342d7bb06
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html