CVE-2025-39701

Source
https://cve.org/CVERecord?id=CVE-2025-39701
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39701.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39701
Downstream
Related
Published
2025-09-05T17:21:07.580Z
Modified
2026-05-07T04:17:07.248558Z
Summary
ACPI: pfr_update: Fix the driver update version check
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: pfr_update: Fix the driver update version check

The security-version-number check should be used rather than the runtime version check for driver updates.

Otherwise, the firmware update would fail when the update binary had a lower runtime version number than the current one.

[ rjw: Changelog edits ]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39701.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0db89fa243e5edc5de38c88b369e4c3755c5fb74
Fixed
79300ff532bccbbf654992c7c0863b49a6c3973c
Fixed
cf0a88124e357bffda487cbf3cb612bb97eb97e4
Fixed
b00219888c11519ef75d988fa8a780da68ff568e
Fixed
908094681f645d3a78e18ef90561a97029e2df7b
Fixed
8151320c747efb22d30b035af989fed0d502176e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39701.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
6.1.149
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.103
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.44
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39701.json"