CVE-2025-39788

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE On Google gs101, the number of UTP transfer request slots (nutrs) is 32, and in this case the driver ends up programming the UTRL_NEXUS_TYPE incorrectly as 0. This is because the left hand side of the shift is 1, which is of type int, i.e. 31 bits wide. Shifting by more than that width results in undefined behaviour. Fix this by switching to the BIT() macro, which applies correct type casting as required. This ensures the correct value is written to UTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift warning: UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21 shift exponent 32 is too large for 32-bit type 'int' For consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE write.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Jan 2026, 20:25

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/01510a9e8222f11cce064410f3c2fcf0756c0a08 - () https://git.kernel.org/stable/c/01510a9e8222f11cce064410f3c2fcf0756c0a08 - Patch
References () https://git.kernel.org/stable/c/01aad16c2257ab8ff33b152b972c9f2e1af47912 - () https://git.kernel.org/stable/c/01aad16c2257ab8ff33b152b972c9f2e1af47912 - Patch
References () https://git.kernel.org/stable/c/098b2c8ee208c77126839047b9e6e1925bb35baa - () https://git.kernel.org/stable/c/098b2c8ee208c77126839047b9e6e1925bb35baa - Patch
References () https://git.kernel.org/stable/c/5b9f1ef293428ea9c0871d96fcec2a87c4445832 - () https://git.kernel.org/stable/c/5b9f1ef293428ea9c0871d96fcec2a87c4445832 - Patch
References () https://git.kernel.org/stable/c/6d53b2a134da77eb7fe65c5c7c7a3c193539a78a - () https://git.kernel.org/stable/c/6d53b2a134da77eb7fe65c5c7c7a3c193539a78a - Patch
References () https://git.kernel.org/stable/c/c1f025da8f370a015e412b55cbcc583f91de8316 - () https://git.kernel.org/stable/c/c1f025da8f370a015e412b55cbcc583f91de8316 - Patch
References () https://git.kernel.org/stable/c/dc8fb963742f1a38d284946638f9358bdaa0ddee - () https://git.kernel.org/stable/c/dc8fb963742f1a38d284946638f9358bdaa0ddee - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

11 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-11 17:15

Updated : 2026-01-16 20:25


NVD link : CVE-2025-39788

Mitre link : CVE-2025-39788

CVE.ORG link : CVE-2025-39788


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write