CVE-2025-39683

Source
https://cve.org/CVERecord?id=CVE-2025-39683
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39683.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-39683
Downstream
Related
Published
2025-09-05T17:20:49.821Z
Modified
2026-04-02T12:48:06.557215Z
Summary
tracing: Limit access to parser->buffer when trace_get_user failed
Details

In the Linux kernel, the following vulnerability has been resolved:

tracing: Limit access to parser->buffer when tracegetuser failed

When the length of the string written to setftracefilter exceeds FTRACEBUFFMAX, the following KASAN alarm will be triggered:

BUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0 Read of size 1 at addr ffff0000d00bd5ba by task ash/165

CPU: 1 UID: 0 PID: 165 Comm: ash Not tainted 6.16.0-g6bcdbd62bd56-dirty Hardware name: linux,dummy-virt (DT) Call trace: showstack+0x34/0x50 (C) dumpstacklvl+0xa0/0x158 printaddressdescription.constprop.0+0x88/0x398 printreport+0xb0/0x280 kasan_report+0xa4/0xf0 __asanreportload1noabort+0x20/0x30 strsep+0x18c/0x1b0 ftraceprocessregex.isra.0+0x100/0x2d8 ftraceregex_release+0x484/0x618 __fput+0x364/0xa58 ____fput+0x28/0x40 taskworkrun+0x154/0x278 donotifyresume+0x1f0/0x220 el0svc+0xec/0xf0 el0t64synchandler+0xa0/0xe8 el0t64sync+0x1ac/0x1b0

The reason is that tracegetuser will fail when processing a string longer than FTRACEBUFFMAX, but not set the end of parser->buffer to 0. Then an OOB access will be triggered in ftraceregexrelease-> ftraceprocessregex->strsep->strpbrk. We can solve this problem by limiting access to parser->buffer when tracegetuser failed.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39683.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
634684d79733124f7470b226b0f42aada4426b07
Fixed
b842ef39c2ad6156c13afdec25ecc6792a9b67b9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8c9af478c06bb1ab1422f90d8ecbc53defd44bc3
Fixed
41b838420457802f21918df66764b6fbf829d330
Fixed
418b448e1d7470da9d4d4797f71782595ee69c49
Fixed
58ff8064cb4c7eddac4da1a59da039ead586950a
Fixed
d0c68045b8b0f3737ed7bd6b8c83b7887014adee
Fixed
3079517a5ba80901fe828a06998da64b9b8749be
Fixed
6a909ea83f226803ea0e718f6e88613df9234d58
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
24cd31752f47699b89b4b3471155c8e599a1a23a
Last affected
e9cb474de7ff7a970c2a3951c12ec7e3113c0c35
Last affected
6ab671191f64b0da7d547e2ad4dc199ca7e5b558
Last affected
3d9281a4ac7171c808f9507f0937eb236b353905
Last affected
0b641b25870f02e2423e494365fc5243cc1e2759
Last affected
ffd51dbfd2900e50c71b5c069fe407957e52d61f
Last affected
cdd107d7f18158d966c2bc136204fe826dac445c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39683.json"