In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: mdt_loader: Ensure we don't read past the ELF header
When the MDT loader is used in remoteproc, the ELF header is sanitized
beforehand, but that's not necessary the case for other clients.
Validate the size of the firmware buffer to ensure that we don't read
past the end as we iterate over the header. e_phentsize and e_shentsize
are validated as well, to ensure that the assumptions about step size in
the traversal are valid.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-09-11 17:15
Updated : 2026-01-16 20:25
NVD link : CVE-2025-39787
Mitre link : CVE-2025-39787
CVE.ORG link : CVE-2025-39787
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
