In the Linux kernel, the following vulnerability has been resolved: soc: qcom: mdt_loader: Ensure we don't read past the ELF header When the MDT loader is used in remoteproc, the ELF header is sanitized beforehand, but that's not necessary the case for other clients. Validate the size of the firmware buffer to ensure that we don't read past the end as we iterate over the header. e_phentsize and e_shentsize are validated as well, to ensure that the assumptions about step size in the traversal are valid.
History

Fri, 12 Sep 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Vendors & Products Linux
Linux linux Kernel

Fri, 12 Sep 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Thu, 11 Sep 2025 17:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: soc: qcom: mdt_loader: Ensure we don't read past the ELF header When the MDT loader is used in remoteproc, the ELF header is sanitized beforehand, but that's not necessary the case for other clients. Validate the size of the firmware buffer to ensure that we don't read past the end as we iterate over the header. e_phentsize and e_shentsize are validated as well, to ensure that the assumptions about step size in the traversal are valid.
Title soc: qcom: mdt_loader: Ensure we don't read past the ELF header
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-09-11T16:56:36.426Z

Updated: 2025-09-11T16:56:36.426Z

Reserved: 2025-04-16T07:20:57.131Z

Link: CVE-2025-39787

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-11T17:15:44.907

Modified: 2025-09-11T17:15:44.907

Link: CVE-2025-39787

cve-icon Redhat

Severity : Low

Publid Date: 2025-09-11T00:00:00Z

Links: CVE-2025-39787 - Bugzilla