In the Linux kernel, the following vulnerability has been resolved:
objtool, nvmet: Fix out-of-bounds stack access in nvmetctrlstate_show()
The cstsstatenames[] array only has six sparse entries, but the iteration code in nvmetctrlstate_show() iterates seven, resulting in a potential out-of-bounds stack read. Fix that.
Fixes the following warning with an UBSAN kernel:
vmlinux.o: warning: objtool: .text.nvmetctrlstate_show: unexpected end of section
[
{
"id": "CVE-2025-39778-1c1ccccc",
"signature_version": "v1",
"digest": {
"function_hash": "71087854920240502269403519114155690472",
"length": 456.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@107a23185d990e3df6638d9a84c835f963fe30a6",
"target": {
"file": "drivers/nvme/target/debugfs.c",
"function": "nvmet_ctrl_state_show"
}
},
{
"id": "CVE-2025-39778-5890238f",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"273631903236012408707067679153289246988",
"200702222193627079079648906520573556260",
"159592016551804016518730813508078805228",
"157741953396477183979920779355389123578"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cc0efc58d6c741b2868d4af24874d7fec28a575",
"target": {
"file": "drivers/nvme/target/debugfs.c"
}
},
{
"id": "CVE-2025-39778-7bd92944",
"signature_version": "v1",
"digest": {
"function_hash": "71087854920240502269403519114155690472",
"length": 456.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cc0efc58d6c741b2868d4af24874d7fec28a575",
"target": {
"file": "drivers/nvme/target/debugfs.c",
"function": "nvmet_ctrl_state_show"
}
},
{
"id": "CVE-2025-39778-a3c86e22",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"273631903236012408707067679153289246988",
"200702222193627079079648906520573556260",
"159592016551804016518730813508078805228",
"157741953396477183979920779355389123578"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@107a23185d990e3df6638d9a84c835f963fe30a6",
"target": {
"file": "drivers/nvme/target/debugfs.c"
}
},
{
"id": "CVE-2025-39778-b9763163",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"273631903236012408707067679153289246988",
"200702222193627079079648906520573556260",
"159592016551804016518730813508078805228",
"157741953396477183979920779355389123578"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fbf37a3577b4d64c150cafde338eee17b2f2ea4",
"target": {
"file": "drivers/nvme/target/debugfs.c"
}
},
{
"id": "CVE-2025-39778-d2b6a9be",
"signature_version": "v1",
"digest": {
"function_hash": "71087854920240502269403519114155690472",
"length": 456.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8fbf37a3577b4d64c150cafde338eee17b2f2ea4",
"target": {
"file": "drivers/nvme/target/debugfs.c",
"function": "nvmet_ctrl_state_show"
}
}
]