CVE-2025-39701

Source
https://cve.org/CVERecord?id=CVE-2025-39701
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39701.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39701
Downstream
Related
Published
2025-09-05T17:21:07.580Z
Modified
2026-03-20T12:43:00.821938Z
Summary
ACPI: pfr_update: Fix the driver update version check
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: pfr_update: Fix the driver update version check

The security-version-number check should be used rather than the runtime version check for driver updates.

Otherwise, the firmware update would fail when the update binary had a lower runtime version number than the current one.

[ rjw: Changelog edits ]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39701.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0db89fa243e5edc5de38c88b369e4c3755c5fb74
Fixed
79300ff532bccbbf654992c7c0863b49a6c3973c
Fixed
cf0a88124e357bffda487cbf3cb612bb97eb97e4
Fixed
b00219888c11519ef75d988fa8a780da68ff568e
Fixed
908094681f645d3a78e18ef90561a97029e2df7b
Fixed
8151320c747efb22d30b035af989fed0d502176e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39701.json"