In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: mdt_loader: Ensure we don't read past the ELF header
When the MDT loader is used in remoteproc, the ELF header is sanitized
beforehand, but that's not necessary the case for other clients.
Validate the size of the firmware buffer to ensure that we don't read
past the end as we iterate over the header. e_phentsize and e_shentsize
are validated as well, to ensure that the assumptions about step size in
the traversal are valid.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Sep 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Fri, 12 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 11 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: soc: qcom: mdt_loader: Ensure we don't read past the ELF header When the MDT loader is used in remoteproc, the ELF header is sanitized beforehand, but that's not necessary the case for other clients. Validate the size of the firmware buffer to ensure that we don't read past the end as we iterate over the header. e_phentsize and e_shentsize are validated as well, to ensure that the assumptions about step size in the traversal are valid. | |
Title | soc: qcom: mdt_loader: Ensure we don't read past the ELF header | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-09-11T16:56:36.426Z
Updated: 2025-09-11T16:56:36.426Z
Reserved: 2025-04-16T07:20:57.131Z
Link: CVE-2025-39787

No data.

Status : Received
Published: 2025-09-11T17:15:44.907
Modified: 2025-09-11T17:15:44.907
Link: CVE-2025-39787
