CVE-2025-39790
📋 TL;DR
A double-free vulnerability in the Linux kernel's MHI host driver allows a malicious or compromised remote device to trigger memory corruption. This affects systems using the MHI bus for communication with PCIe-based modems or similar hardware. The vulnerability can lead to kernel crashes or potential privilege escalation.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential privilege escalation allowing full system compromise.
Likely Case
System instability, kernel crashes, or denial of service affecting MHI-connected devices.
If Mitigated
Minimal impact if proper network segmentation and device authentication are in place.
🎯 Exploit Status
Exploitation requires control over a connected MHI device. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commit 2ec99b922f4661521927eeada76f431eebfbabc4 or later
Vendor Advisory: https://git.kernel.org/stable/c/2ec99b922f4661521927eeada76f431eebfbabc4
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commit. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable MHI functionality
linuxRemove or disable MHI host driver if not required
modprobe -r mhi
echo 'blacklist mhi' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Isolate systems with MHI-connected devices from untrusted networks
- Implement strict access controls and monitoring for MHI-connected hardware
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if MHI module is loaded: lsmod | grep mhi
Check Version:
uname -r
Verify Fix Applied:
Check kernel version contains fix commit: grep -q '2ec99b922f4661521927eeada76f431eebfbabc4' /proc/version_signature || uname -r
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes related to MHI driver
- Memory corruption warnings in dmesg
Network Indicators:
- Unusual MHI device communication patterns
SIEM Query:
source="kernel" AND ("mhi" OR "double free" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/2ec99b922f4661521927eeada76f431eebfbabc4
- https://git.kernel.org/stable/c/4079c6c59705b96285219b9efc63cab870d757b7
- https://git.kernel.org/stable/c/44e1a079e18f78d6594a715b0c6d7e18c656f7b9
- https://git.kernel.org/stable/c/5bd398e20f0833ae8a1267d4f343591a2dd20185
- https://git.kernel.org/stable/c/5e17429679a8545afe438ce7a82a13a54e8ceabb
- https://git.kernel.org/stable/c/7b3f0e3b60c27f4fcb69927d84987e5fd6240530
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html