First published: Fri Apr 18 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: clk: samsung: Fix UBSAN panic in samsung_clk_init() With UBSAN_ARRAY_BOUNDS=y, I'm hitting the below panic due to dereferencing `ctx->clk_data.hws` before setting `ctx->clk_data.num = nr_clks`. Move that up to fix the crash. UBSAN: array index out of bounds: 00000000f2005512 [#1] PREEMPT SMP <snip> Call trace: samsung_clk_init+0x110/0x124 (P) samsung_clk_init+0x48/0x124 (L) samsung_cmu_register_one+0x3c/0xa0 exynos_arm64_register_cmu+0x54/0x64 __gs101_cmu_top_of_clk_init_declare+0x28/0x60 ...
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-39728 has been classified as a medium severity vulnerability due to its potential impact on system stability.
To fix CVE-2025-39728, ensure you apply the latest patches from your Linux distribution that address this vulnerability.
The impact of CVE-2025-39728 is primarily related to system panic, which could lead to unexpected shutdowns or crashes in the Linux kernel.
CVE-2025-39728 affects specific versions of the Linux kernel that utilize the samsung_clk_init function with incorrect context handling.
As of now, there is no evidence to suggest that CVE-2025-39728 is being actively exploited in real-world attacks.