CVE-2025-39990

Source
https://cve.org/CVERecord?id=CVE-2025-39990
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39990.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39990
Downstream
Related
Published
2025-10-15T07:56:07.295Z
Modified
2026-03-20T12:43:08.095040Z
Summary
bpf: Check the helper function is valid in get_helper_proto
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Check the helper function is valid in gethelperproto

kernel test robot reported verifier bug [1] where the helper func pointer could be NULL due to disabled config option.

As Alexei suggested we could check on that in gethelperproto directly. Marking tailcall helper func with BPFPTR_POISON, because it is unused by design.

[1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39990.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f470378c7562a2818b45ed11c98973f2b89eedd3
Fixed
3d429cb1278e995e22995ef117fa96d223a67e93
Fixed
6233715b4b714068d6c831d214a4e8792109875a
Fixed
e4414b01c1cd9887bbde92f946c1ba94e40d6d64

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39990.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
6.12.50
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39990.json"