CVE-2025-39678

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-39678
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39678.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39678
Downstream
Related
Published
2025-09-05T17:20:44Z
Modified
2025-10-29T20:27:55.387336Z
Summary
platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL
Details

In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/hsmp: Ensure sock->metrictbladdr is non-NULL

If metric table address is not allocated, accessing metrics_bin will result in a NULL pointer dereference, so add a check.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5150542b8ec5fb561be080ed0ef3bab8598154c3
Fixed
782977c0d8ba432b6fd3d5d0d87016a523ec1c69
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5150542b8ec5fb561be080ed0ef3bab8598154c3
Fixed
d47782d5c0cb87b9826041f34505580204ccf703
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5150542b8ec5fb561be080ed0ef3bab8598154c3
Fixed
2c78fb287e1f430b929f2e49786518350d15605c

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.28
v6.12.29
v6.12.3
v6.12.30
v6.12.31
v6.12.32
v6.12.33
v6.12.34
v6.12.35
v6.12.36
v6.12.37
v6.12.38
v6.12.39
v6.12.4
v6.12.40
v6.12.41
v6.12.42
v6.12.43
v6.12.44
v6.12.45
v6.12.46
v6.12.47
v6.12.48
v6.12.49
v6.12.5
v6.12.50
v6.12.51
v6.12.52
v6.12.53
v6.12.54
v6.12.55
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.16.1
v6.16.2
v6.16.3
v6.17-rc1
v6.6
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "digest": {
            "length": 447.0,
            "function_hash": "235474679926655505168523194819048064297"
        },
        "target": {
            "file": "drivers/platform/x86/amd/hsmp/hsmp.c",
            "function": "hsmp_metric_tbl_read"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2c78fb287e1f430b929f2e49786518350d15605c",
        "id": "CVE-2025-39678-0692609a",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "length": 447.0,
            "function_hash": "235474679926655505168523194819048064297"
        },
        "target": {
            "file": "drivers/platform/x86/amd/hsmp/hsmp.c",
            "function": "hsmp_metric_tbl_read"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d47782d5c0cb87b9826041f34505580204ccf703",
        "id": "CVE-2025-39678-0be968ac",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "line_hashes": [
                "184487851759923036326717004058544041529",
                "160392082800386179278158170408206075408",
                "305199346772286626969409713834767986061"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/platform/x86/amd/hsmp.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@782977c0d8ba432b6fd3d5d0d87016a523ec1c69",
        "id": "CVE-2025-39678-7ede2e11",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "line_hashes": [
                "245536100402612370691143466668075024591",
                "70264343185581604609060930927347884366",
                "330013796207169636029490347039146538996"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/platform/x86/amd/hsmp/hsmp.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d47782d5c0cb87b9826041f34505580204ccf703",
        "id": "CVE-2025-39678-9bb44a25",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "digest": {
            "length": 526.0,
            "function_hash": "85744983592277065873464229320724245582"
        },
        "target": {
            "file": "drivers/platform/x86/amd/hsmp.c",
            "function": "hsmp_metric_tbl_read"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@782977c0d8ba432b6fd3d5d0d87016a523ec1c69",
        "id": "CVE-2025-39678-d4573afe",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "digest": {
            "line_hashes": [
                "245536100402612370691143466668075024591",
                "70264343185581604609060930927347884366",
                "330013796207169636029490347039146538996"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "drivers/platform/x86/amd/hsmp/hsmp.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2c78fb287e1f430b929f2e49786518350d15605c",
        "id": "CVE-2025-39678-f2bd292f",
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.56
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.4