CVE-2025-39939

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in the Linux kernel's s390 IOMMU subsystem allows reading from or writing to arbitrary memory locations when using identity domains. This affects Linux systems running on IBM Z/s390 architecture. The vulnerability can lead to system crashes, data corruption, or potential privilege escalation.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available for stable branches.
Operating Systems: Linux distributions running on IBM Z/s390 architecture
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using s390 architecture with IOMMU identity domains enabled.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to system crash, data loss, or potential privilege escalation to kernel mode.

🟠

Likely Case

System instability, crashes, or denial of service when accessing device statistics via sysfs.

🟢

If Mitigated

Limited impact if identity domains are not used or systems are patched.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of system configuration. Discovered via KASAN testing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via git commits 17a58caf3863163c4a84a218a9649be2c8061443 and b3506e9bcc777ed6af2ab631c86a9990ed97b474

Vendor Advisory: https://git.kernel.org/stable/c/17a58caf3863163c4a84a218a9649be2c8061443

Restart Required: Yes

Instructions:

1. Update to patched kernel version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify patch is applied.

🔧 Temporary Workarounds

Disable identity domains

linux

Avoid using identity domains for devices on s390 systems if possible.

🧯 If You Can't Patch

  • Restrict access to sysfs device statistics to trusted users only
  • Monitor systems for KASAN reports or kernel panics related to zpci_fmb_enable_device

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if running on s390 architecture with IOMMU enabled. Look for KASAN reports mentioning zpci_fmb_enable_device.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the git commit fixes. Check dmesg for absence of KASAN reports related to this function.

📡 Detection & Monitoring

Log Indicators:

  • KASAN reports in dmesg/kernel logs
  • Kernel panics or oops messages
  • System crashes when accessing device statistics

SIEM Query:

source="kernel" AND ("KASAN" OR "zpci_fmb_enable_device" OR "global-out-of-bounds")

🔗 References

📤 Share & Export