CVE-2025-39784

Source
https://cve.org/CVERecord?id=CVE-2025-39784
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39784.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39784
Downstream
Published
2025-09-11T16:56:34.097Z
Modified
2025-12-02T18:38:44.485607Z
Summary
PCI: Fix link speed calculation on retrain failure
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix link speed calculation on retrain failure

When pciefailedlink_retrain() fails to retrain, it tries to revert to the previous link speed. However it calculates that speed from the Link Control 2 register without masking out non-speed bits first.

PCIELNKCTL2TLS2SPEED() converts such incorrect values to PCISPEEDUNKNOWN (0xff), which in turn causes a WARN splat in pciesettarget_speed():

pci 0000:00:01.1: [1022:14ed] type 01 class 0x060400 PCIe Root Port pci 0000:00:01.1: broken device, retraining non-functional downstream link at 2.5GT/s pci 0000:00:01.1: retraining failed WARNING: CPU: 1 PID: 1 at drivers/pci/pcie/bwctrl.c:168 pciesettargetspeed RDX: 0000000000000001 RSI: 00000000000000ff RDI: ffff9acd82efa000 pciefailedlinkretrain pcideviceadd pciscansingle_device

Mask out the non-speed bits in PCIELNKCTL2TLS2SPEED() and PCIELNKCAPSLS2SPEED() so they don't incorrectly return PCISPEEDUNKNOWN.

[bhelgaas: commit log, add details from https://lore.kernel.org/r/1c92ef6bcb314ee6977839b46b393282e4f52e74.1750684771.git.lukas@wunner.de]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39784.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
de9a6c8d5dbfedb5eb3722c822da0490f6a59a45
Fixed
16557320f378262b5c605b15edebd3642406992a
Fixed
9989e0ca7462c62f93dbc62f684448aa2efb9226

Affected versions

v6.*
v6.12
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.16.1
v6.16.2
v6.16.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39784.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39784.json"